CN111209255A - Method for constructing common communication timestamp chain - Google Patents

Method for constructing common communication timestamp chain Download PDF

Info

Publication number
CN111209255A
CN111209255A CN202010082689.2A CN202010082689A CN111209255A CN 111209255 A CN111209255 A CN 111209255A CN 202010082689 A CN202010082689 A CN 202010082689A CN 111209255 A CN111209255 A CN 111209255A
Authority
CN
China
Prior art keywords
timestamp
chain
node
information
constructing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010082689.2A
Other languages
Chinese (zh)
Inventor
朱建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qichain Technology Shenzhen Co Ltd
Original Assignee
Qichain Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qichain Technology Shenzhen Co Ltd filed Critical Qichain Technology Shenzhen Co Ltd
Priority to CN202010082689.2A priority Critical patent/CN111209255A/en
Publication of CN111209255A publication Critical patent/CN111209255A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • G06F16/137Hash-based
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a method for constructing a common letter timestamp chain, and relates to the field of Internet application. The method specifically comprises the following steps: and establishing a common trusted timestamp chain generation center, sending a request to the timestamp chain generation center, generating a timestamp, and verifying the validity of the timestamp. The method removes the dependence on the third party authority, changes the evidence of the timestamp effectiveness from credibility to common credibility, establishes a simple, efficient, transparent and reliable timestamp chain generation, application and verification mechanism, improves the creating efficiency of the timestamp, meets the high-frequency application scene, and reduces the application threshold.

Description

Method for constructing common communication timestamp chain
Technical Field
The invention relates to the field of Internet application, in particular to a method for constructing a common communication timestamp chain.
Background
In computer applications, time is an important attribute for recording and certifying the generation of electronic information, and especially in many legal related scenes, such as electronic contracts, certificates, and the like, a timestamp is a very critical element and is directly related to the validity of an electronic document. Meanwhile, the time stamps also indicate the sequence of file generation, and when some copyright disputes occur, the reliable time stamps are also important factors for correct judgment. Therefore, the generation, application, and verification of the time stamp becomes very important.
Traditional trusted timestamps are issued by some agencies and can prove that electronic data is an existing, complete, and verifiable electronic certificate at a time node. Such timestamps require a third party organization, the issuing organization, to endorse the endorsement, and once the credit for that organization goes wrong, the timestamp it issues becomes meaningless. Therefore, how to implement the service of removing the trusted timestamp of the third-party institution is a technical problem in the prior art at present.
One of the methods for removing the third party authority is to change the trust into the common trust, establish a trust alliance, and ensure that the time stamp generated by the alliance can be trusted through technology. One current solution is to use blockchains to generate, save and verify timestamps, such as the methods mentioned in patents CN109726597A and CN 110535663A. But the efficiency of the block chain is not high, the specialization degree is low, and the complexity of access and application is high.
Disclosure of Invention
In view of the above, the present invention provides a method for constructing a trusted timestamp chain. The method removes the dependence on third-party authorities, and establishes a simple, efficient, transparent and reliable timestamp chain generation, application and verification mechanism based on the common trust basis.
The invention is realized by the following technical scheme: a method for constructing a common communication timestamp chain specifically comprises the following steps:
(1) establishing a common trusted timestamp chain generation center;
(2) sending a request to a timestamp chain generation center and generating a timestamp;
(3) and verifying the validity of the timestamp.
Further, in step 1, the timestamp chain generation center is not an authority, and the timestamp chain generation center is a decentralized data write interface, so as to improve the efficiency of constructing the timestamp chain, and mainly includes the following interfaces:
(11) establishing and authenticating an interface for the identity of the coalition members;
(12) a timestamp generation interface;
(13) a timestamp verification interface.
Further, in step 2, the federation members send a timestamp creation request, where the creation request mainly includes: federation membership information, a file or a hash of information, where a file or information refers to electronic information to be associated with a timestamp.
Further, in step 2, after receiving the timestamp creation request, the timestamp chain generation center newly creates a timestamp node, where the timestamp node includes current time information and a hash value of the file or information requested to be submitted.
Further, in step 2, in order to link the timestamp data chain, the newly created timestamp node hashes the node added to the latest timestamp node in the timestamp data chain, the newly created timestamp node performs a hash algorithm on the information in the node together, and the generated hash value is the node hash of the newly created timestamp node.
Further, in step 2, the newly created timestamp node is stored in the timestamp data chain, and the node hash of the node is returned to the caller sending the request, so that the caller obtains the timestamp of the hash value for the binding file or information.
Further, in step 3, the timestamp chain data is public, and anyone can obtain all the data, and when verifying, first, the corresponding timestamp node is searched according to the previously obtained timestamp information, and then the hash value of the file or information in the timestamp node is compared with the hash value of the actual file or information corresponding to the timestamp, and if the hash values are consistent, the timestamp is proved to be valid.
Further, in step 3, the timestamp chain generation center also provides a timestamp verification interface, and the user only needs to submit the timestamp information and the hash value of the actual file or information to verify the authenticity of the timestamp.
The invention has the beneficial effects that: the dependence on the third party authority is removed, and the certification of the time stamp effectiveness is changed from the third party certification to the public co-evidence and from the credibility to the mutual trust. Moreover, the generation process of the time stamp and all generated data are open transparently, so that the participant can fully trust the time stamp generated by the system. Meanwhile, the establishment of the time stamps is uniformly completed by the time stamp chain generation center, so that the establishment efficiency of the time stamps is greatly improved, a high-frequency application scene is met, the application threshold is reduced, and the workload of medium and small-sized application access is reduced.
Drawings
Fig. 1 is a flowchart of a method for constructing a trusted timestamp chain according to the present invention.
Fig. 2 is a structural diagram of a timestamp chain of a method for constructing a trusted timestamp chain according to the present invention.
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention in a schematic way, and the features in the following embodiments and examples may be combined with each other without conflict.
Wherein the showings are for the purpose of illustrating the invention only and not for the purpose of limiting the same, and in which there is shown by way of illustration only and not in the drawings in which there is no intention to limit the invention thereto; to better illustrate the embodiments of the present invention, some parts of the drawings may be omitted, enlarged or reduced, and do not represent the size of an actual product; it will be understood by those skilled in the art that certain well-known structures in the drawings and descriptions thereof may be omitted.
The invention provides a method for constructing a common communication timestamp chain. The method removes the dependence on third-party authorities, and establishes a simple, efficient, transparent and reliable timestamp chain generation, application and verification mechanism based on the common trust basis. The specific embodiment is as follows:
(1) data management center for establishing timestamp chain
The timestamp chain data management center mainly functions to provide management on the timestamp chain data, and comprises the following steps: and functions of new creation, access and distribution.
The new function is mainly to create a timestamp node and link the timestamp node into a timestamp data chain.
The timestamp data chain is constructed as shown in fig. 2, the whole data chain is formed by linking timestamp nodes, nodes are associated through node hash, and the node hash is a result obtained by performing hash operation on all data in the nodes. The timestamp node mainly comprises four types of information: file hash, time information, last node hash, and node hash.
The file hash is a hash value that the caller wants to prove the file or information, and the time information is the time created by the timestamp node, both of which are used to prove the validity of the timestamp.
The last node hash is used for linking the whole data chain and is a pointer for guiding the relationship between nodes, the node hash is used for hashing the whole node data, the integrity and the tamper resistance of the node data are guaranteed, the two functions are that the whole data chain is constructed, and the authenticity of the file hash and time information inside the data chain is protected.
The access function is to complete the traversal and search of data in the data chain for the caller and return the node data expected to be obtained.
The distribution function is to open the data in the whole timestamp chain to the outside and provide the subscriber with the synchronization function. As the data chain grows, the subscriber can obtain new timestamp chain data the first time.
(2) Establishing an external service interface, which mainly comprises the following steps:
(21) federation member identity establishment and authentication interface
The member of the alliance establishes identity through registering, obtain the interface after authorizing and visit the voucher, visit the voucher through the interface, the member can set up and verify the time stamp.
(22) Timestamp generation interface
The federation members send a timestamp creation request, which mainly comprises: federation membership information, a file or a hash of information, where a file or information refers to electronic information to be associated with a timestamp.
After receiving the timestamp creation request, the timestamp chain generation center newly creates a timestamp node, and the timestamp node comprises the current time information and the hash value of the file or information submitted by the request.
In order to link the timestamp data chain, the newly created timestamp node hashes the node of the latest timestamp node added into the timestamp data chain, the newly created timestamp node performs a hashing algorithm on information in the node, and the generated hash value is the node hash of the newly created timestamp node.
And storing the newly created timestamp node into a timestamp data chain, and returning the node hash of the node to the federation member sending the request, namely the timestamp of the hash value aiming at the binding file or the information.
(23) Timestamp verification interface
The caller can verify the authenticity of the timestamp by only submitting the timestamp information and the hash value of the actual file or information through the timestamp verification interface.
Finally, the above embodiments are only intended to illustrate the technical solutions of the present invention and not to limit the present invention, and although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions, and all of them should be covered by the claims of the present invention.

Claims (8)

1. A method for constructing a common communication timestamp chain is characterized by comprising the following steps:
(1) establishing a common trusted timestamp chain generation center;
(2) sending a request to a timestamp chain generation center and generating a timestamp;
(3) and verifying the validity of the timestamp.
2. The method for constructing a trusted timestamp chain according to claim 1, wherein in step 1, the timestamp chain generation center is not an authority, and the timestamp chain generation center is a write interface for decentralized data, so as to improve efficiency of constructing the timestamp chain, and mainly includes the following interfaces:
(11) establishing and authenticating an interface for the identity of the coalition members;
(12) a timestamp generation interface;
(13) a timestamp verification interface.
3. The method for constructing a trusted timestamp chain according to claim 1, wherein in step 2, the federation members send a timestamp creation request, and the creation request mainly includes: federation membership information, a file or a hash of information, where a file or information refers to electronic information to be associated with a timestamp.
4. The method for constructing a trusted timestamp chain according to claim 1, wherein in step 2, after receiving the timestamp creation request, the timestamp chain generation center newly creates a timestamp node, and the timestamp node includes current time information and a hash value of the file or information requested to be submitted.
5. The method for constructing a trusted timestamp chain according to claim 1, wherein in step 2, in order to link the timestamp data chain, the newly created timestamp node further hashes a node added to a latest timestamp node in the timestamp data chain, the newly created timestamp node performs a hash algorithm on information in the node together, and the generated hash value is a node hash of the newly created timestamp node.
6. The method according to claim 1, wherein in step 2, the newly created timestamp node is stored in the timestamp data chain, and the node hash of the node is returned to the caller who sent the request, so that the caller obtains the timestamp of the hash value of the binding file or information.
7. The method for constructing a trusted timestamp chain according to claim 1, wherein in step 3, the timestamp chain data is public, and anyone can obtain all the data, and when verifying, the corresponding timestamp node is searched according to the timestamp information obtained previously, and then the hash value of the file or information in the timestamp node is compared with the hash value of the actual file or information corresponding to the timestamp, and if the hash values are consistent, the timestamp is proved to be valid.
8. The method for constructing a trusted timestamp chain according to claim 1, wherein in step 3, the timestamp chain generation center also provides a timestamp verification interface, so that the user can verify the authenticity of the timestamp by only submitting the timestamp information and the hash value of the actual file or information.
CN202010082689.2A 2020-02-07 2020-02-07 Method for constructing common communication timestamp chain Withdrawn CN111209255A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010082689.2A CN111209255A (en) 2020-02-07 2020-02-07 Method for constructing common communication timestamp chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010082689.2A CN111209255A (en) 2020-02-07 2020-02-07 Method for constructing common communication timestamp chain

Publications (1)

Publication Number Publication Date
CN111209255A true CN111209255A (en) 2020-05-29

Family

ID=70787803

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010082689.2A Withdrawn CN111209255A (en) 2020-02-07 2020-02-07 Method for constructing common communication timestamp chain

Country Status (1)

Country Link
CN (1) CN111209255A (en)

Similar Documents

Publication Publication Date Title
JP7109569B2 (en) Digital certificate verification method and its device, computer equipment and computer program
CN109829326B (en) Cross-domain authentication and fair audit de-duplication cloud storage system based on block chain
WO2021120253A1 (en) Data storage method and verification method for blockchain structure, blockchain structure implementation method, blockchain-structured system, device, and medium
CN108696358B (en) Digital certificate management method and device, readable storage medium and service terminal
CN110138560B (en) Double-proxy cross-domain authentication method based on identification password and alliance chain
CN108933667B (en) Management method and management system of public key certificate based on block chain
CN111884815A (en) Block chain-based distributed digital certificate authentication system
CN112468441B (en) Cross-heterogeneous-domain authentication system based on block chain
CN110061851A (en) A kind of across trust domain authentication method and system of decentralization
Chen et al. Bidm: a blockchain-enabled cross-domain identity management system
KR20200106000A (en) System and method for implementing blockchain-based digital certificate
CN112818368A (en) Digital certificate authentication method based on block chain intelligent contract
SE541713C2 (en) Method and system for registering digital documents
CN113824563B (en) Cross-domain identity authentication method based on block chain certificate
US20200259663A1 (en) One-Time Data Signature System and Method with Untrusted Server Assistance
Miao et al. Blockchain assisted multi-copy provable data possession with faults localization in multi-cloud storage
CN109886036B (en) Domain name distributed authentication method and device based on block chain and block chain network
CN108696348A (en) A kind of method, apparatus, system and electronic equipment for realizing CA mutual trusts
Gulati et al. Self-sovereign dynamic digital identities based on blockchain technology
CN111586049A (en) Lightweight key authentication method and device for mobile internet
CN109995737A (en) The digital certificate management method and device of decentralization, node, system
CN114691669A (en) Electronic certificate storage method and device, electronic equipment and storage medium
CN105187218A (en) Digital record signature method for multicore infrastructure and verification method
CN110647553B (en) Block chain-based power transaction contract management method and system
Loporchio et al. A survey of set accumulators for blockchain systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200529