CN111241558A - Self-certification notarization method and system based on block chain - Google Patents
Self-certification notarization method and system based on block chain Download PDFInfo
- Publication number
- CN111241558A CN111241558A CN202010005764.5A CN202010005764A CN111241558A CN 111241558 A CN111241558 A CN 111241558A CN 202010005764 A CN202010005764 A CN 202010005764A CN 111241558 A CN111241558 A CN 111241558A
- Authority
- CN
- China
- Prior art keywords
- information
- behavior event
- event information
- encrypted
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 230000003542 behavioural effect Effects 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000011835 investigation Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Automation & Control Theory (AREA)
- Technology Law (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the field of block chains, and particularly provides a self-certification notarization method and a self-certification notarization system based on a block chain, wherein the self-certification notarization method comprises the steps of obtaining behavior event information uploaded by a user, encrypting the behavior event information to generate encrypted behavior event information, generating corresponding behavior event summary information according to the encrypted behavior event information, and performing secondary encryption according to the behavior event summary information to form encrypted summary information; and acquiring the timestamp information, storing the encrypted behavior event information and the encrypted abstract information into a storage node of a security block chain, and synchronizing data among the nodes so as to achieve the notarization effect. By the method and the system, authenticity of the behavior event and data is protected by using the non-falsifiable characteristic of the block chain in a mode of uploading a certain behavior event and material to the block chain system, and professional notarization personnel are not needed to be arranged, so that evidence storage of a user and evidence collection of a judicial institution are facilitated.
Description
Technical Field
The invention relates to the field of block chains, in particular to a self-certification notarization system and a self-certification notarization method based on a block chain.
Background
The block chain is a decentralized protocol, can safely store digital currency transactions or other data, can not be forged and falsified, has high public trust, can automatically execute intelligent contracts, and does not need to be audited by any centralized organization.
The existing notarization generally adopts an offline notarization process, and the process is generally as follows: the consignor carries the notarization material to a specific notarization place and completes the notarization of the consignment item under the authentication and investigation of the notarization member, however, the notarization method has the following problems: 1 notarization requires the assistance of specific time, place and professional; 2, establishing a continuously credible state for professional literacy of professionals; the user still needs to carry the data to a specific notarization place for notarization, so that the user is obviously inconvenient to rapidly notarize, and excessive time is wasted.
Disclosure of Invention
The invention mainly aims to provide a block chain-based self-certification notarization system and a block chain-based self-certification notarization method which are simple in process and capable of improving notarization reliability
In order to achieve the purpose, the invention adopts the technical scheme that:
in a first aspect, the present invention provides a block chain-based self-certification notarization method, specifically including:
acquiring behavior event information uploaded by a user;
encrypting the behavior event information to generate encrypted behavior event information;
generating corresponding behavior event abstract information according to the encrypted behavior event information;
performing secondary encryption according to the behavior event abstract information to form encrypted abstract information;
acquiring the timestamp information, and storing the encrypted behavior event information and the encrypted summary information into a storage node of a storage block chain;
and taking a notarization server, a judicial identification center server and a network arbitration server as nodes to be respectively linked and accessed into the security block chain, and synchronizing data among the nodes.
Further, encrypting the behavior event information to generate encrypted behavior event information specifically includes;
encrypting the behavior event information through a Hash algorithm to form encrypted behavior event information and a behavior event information decryption key;
and acquiring authority distribution information, and sending the behavior event information decryption key to a corresponding server terminal according to the authority distribution information.
Further, performing secondary encryption according to the behavior event summary information to form encrypted summary information, which specifically includes;
encrypting the behavior event abstract information through a Hash algorithm to form encrypted behavior event abstract information and a behavior event abstract information decryption key;
and acquiring authority distribution information, and sending the behavior event summary information decryption key to a corresponding server terminal according to the authority distribution information.
Further, the link accessing the notarization server, the judicial identification center server and the network arbitration server as nodes to the security block chain respectively, and after synchronizing data among the nodes, the method further includes:
acquiring secondary behavior event information uploaded by a user;
judging when the secondary behavior event information is consistent with the behavior event information;
and judging the secondary behavior event information to be correct information, and encrypting and storing the secondary behavior event information.
In a second aspect, the present invention further provides a self-certification notarization system based on a block chain, which includes a signal acquisition module, a processing module, an encryption module and a block chain management module;
all modules are connected with each other;
the signal acquisition module is used for acquiring behavior event information uploaded by a user;
the encryption module is used for encrypting the behavior event information so as to generate encrypted behavior event information;
the processing module is used for generating corresponding behavior event summary information according to the encrypted behavior event information;
the encryption module is also used for carrying out secondary encryption according to the behavior event summary information to form encrypted summary information;
the block chain management module is used for acquiring the timestamp information and storing the acquired encrypted behavior event information and the encrypted summary information into a storage node of a security block chain;
the processing module is also used for taking a behavior event server, a judicial appraisal center server and a network arbitration server as nodes to be respectively linked and accessed into the security block chain, and synchronizing data among the nodes.
Further, the encryption module comprises a first hash algorithm encryption unit and a permission allocation unit,
the first hash algorithm encryption unit is connected with the authority distribution unit;
the encryption module is configured to encrypt the behavior event information, so as to generate encrypted behavior event information, and specifically includes:
the first Hash algorithm encryption unit is used for encrypting the behavior event information through a Hash algorithm so as to form encrypted behavior event information and a behavior event information decryption key;
and the authority distribution unit is used for acquiring authority distribution information and sending the behavior event information decryption key to a corresponding server terminal according to the authority distribution information.
Further, the encryption module further comprises a second hash algorithm encryption unit;
the second hash algorithm encryption unit is connected with the authority distribution unit;
the encryption module is further configured to perform secondary encryption according to the behavior event summary information to form encrypted summary information, and specifically includes:
the second hash algorithm encryption unit is used for encrypting the behavior event summary information through a hash algorithm so as to form encrypted behavior event summary information and a behavior event summary information decryption key;
and the authority distribution unit is also used for acquiring authority distribution information and sending the behavior event summary information decryption key to a corresponding server terminal according to the authority distribution information.
Further, the processing module is further configured to link, as nodes, a behavior event server, a judicial assessment center server, and a network mediation server to the security block chain, and after synchronizing data among the nodes, further includes:
the signal acquisition module is also used for acquiring secondary behavior event information uploaded by a user;
the processing module is further configured to determine when the secondary behavior event information is consistent with the behavior event information;
the processing module is further used for judging the secondary behavior event information to be correct information and encrypting and storing the secondary behavior event information.
By adopting the method and the system, the authenticity of the behavior event and the data is protected by utilizing the characteristic that the block chain cannot be tampered by uploading a certain behavior event and material to the block chain system, and professional notarization personnel are not needed to be arranged, so that the existence of a user is facilitated, the evidence obtaining of a judicial institution is facilitated, and the problems that notarization is required to be carried out at specific time and place and the assistance of professional personnel in the prior art and the professional literacy of the professional personnel needs to be established in a continuous and credible state are solved; the method is used for carrying the data to a specific notarization place for notarization, obviously and inconveniently realizing rapid notarization, thereby wasting too much time, and realizes sending the corresponding decryption keys to the corresponding server terminals by multiple encryption through a Hash algorithm and then according to the preset authority information, so that the server corresponding to the authority information can check the data corresponding to the authority of the server through the corresponding decryption keys, thereby facilitating the management of the data.
Drawings
FIG. 1 is a flowchart of a method of an embodiment of a block chain-based self-certifying notarization method of the present invention;
FIG. 2 is a flowchart of a self-certifying method for block chaining in accordance with another embodiment of the present invention;
FIG. 3 is a flowchart of a block chain-based self-certifying method according to another embodiment of the present invention;
FIG. 4 is a flowchart of a block chain-based self-certifying method according to another embodiment of the present invention;
FIG. 5 is a system diagram of an embodiment of a block chain based self-certification notarization system of the present invention;
FIG. 6 is a block diagram of an encryption module according to an embodiment of the present invention;
the number designations in the figures are: 10-a signal acquisition module, 20-a processing module, 30-a block chain management module, 40-an encryption module, 41-a first hash algorithm encryption unit, 42-a right distribution unit and 43-a second hash algorithm encryption unit.
Detailed Description
The following further describes embodiments of the present invention with reference to the drawings. It should be noted that the description of the embodiments is provided to help understanding of the present invention, but the present invention is not limited thereto. In addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
In a first aspect, as shown in fig. 1, the present invention provides a block chain-based self-certification notarization method, which specifically includes:
s100, acquiring behavior event information uploaded by a user;
s200, encrypting the behavior event information to generate encrypted behavior event information;
s300, generating corresponding behavior event abstract information according to the encrypted behavior event information;
s400, performing secondary encryption according to the behavior event summary information to form encrypted summary information;
s500, acquiring the timestamp information, and storing the encrypted behavior event information and the encrypted summary information into a storage node of a storage block chain;
and S600, taking the notarization department server, the judicial identification center server and the network arbitration server as nodes to be respectively linked and accessed into the security block chain, and synchronizing data among the nodes.
Further, as shown in fig. 2, the step S200 specifically includes;
s201, encrypting the behavior event information through a Hash algorithm to form encrypted behavior event information and a behavior event information decryption key;
s201, acquiring authority distribution information, and sending the behavior event information decryption key to a corresponding server terminal according to the authority distribution information.
Further, as shown in fig. 3, the step S400 specifically includes;
s401, encrypting the behavior event summary information through a Hash algorithm to form encrypted behavior event summary information and a behavior event summary information decryption key;
s402, acquiring authority distribution information, and sending the behavior event summary information decryption key to a corresponding server terminal according to the authority distribution information.
Further, as shown in fig. 4, after the step S600, the method further includes:
s601, acquiring secondary behavior event information uploaded by a user;
s602, judging when the secondary behavior event information is consistent with the behavior event information;
and S603, judging the secondary behavior event information to be correct information, and encrypting and storing the secondary behavior event information.
In a second aspect, as shown in fig. 5, the present invention further provides a self-certified notarization system based on a blockchain, which includes a signal obtaining module 10, a processing module 20, a blockchain management module 30, and an encryption module 40;
all modules are connected with each other;
the signal acquisition module 10 is used for acquiring behavior event information uploaded by a user;
the encryption module 20 is configured to encrypt the behavior event information, so as to generate encrypted behavior event information;
the processing module 30 is configured to generate corresponding behavior event summary information according to the encrypted behavior event information;
the encryption module 40 is further configured to perform secondary encryption according to the behavior event summary information to form encrypted summary information;
the block chain management module 50 is configured to obtain the timestamp information, and store the obtained encrypted behavior event information and the encrypted digest information in a storage node of a secure block chain;
the processing module 30 is further configured to link the notarization server, the judicial identification center server, and the network mediation server as nodes into the security block chain, respectively, and synchronize data among the nodes.
Further, as shown in fig. 6, the encryption module 40 includes a first hash algorithm encryption unit 41 and a right assignment unit 42, where the first hash algorithm encryption unit 41 is connected to the right assignment unit 42;
the encryption module 40 is configured to encrypt the behavior event information, so as to generate encrypted behavior event information, which specifically includes:
the first hash algorithm encryption unit 41 is configured to encrypt the behavior event information by a hash algorithm, so as to form encrypted notary information and a behavior event information decryption key;
the authority distributing unit 42 is configured to obtain authority distribution information, and send the behavior event information decryption key to a corresponding server terminal according to the authority distribution information.
Further, as shown in fig. 6, the encryption module further includes a second hash algorithm encryption unit 43;
the second hash algorithm encryption unit 43 is connected with the authority distribution unit 42;
the encryption module 40 is further configured to perform secondary encryption according to the behavior event summary information to form encrypted summary information, which specifically includes:
the second hash algorithm encryption unit 43 is configured to encrypt the behavior event summary information by a hash algorithm, so as to form encrypted behavior event summary information and a behavior event summary information decryption key;
the authority distributing unit 42 is further configured to obtain authority distribution information, and send the behavior event summary information decryption key to a corresponding server terminal according to the authority distribution information.
Further, the processing module 30 is further configured to link the behavioral event server, the judicial assessment center server, and the network mediation server as nodes into the security block chain, and after synchronizing data among the nodes, further includes:
the signal acquisition module 10 is further configured to acquire secondary behavior event information uploaded by a user;
the processing module 30 is further configured to determine that the secondary behavior event information is consistent with the behavior event information;
the processing module 30 is further configured to determine that the secondary behavior event information is correct information, and encrypt and store the secondary behavior event information.
In a specific application scenario of the invention, a company a and a company b confirm to sign a contract a, then the company a and the company b upload the contract to a system, then a signal acquisition module 10 acquires the contract uploaded by the company a and the company b, then an encryption module 20 encrypts the contract to generate encrypted behavior event information, then a processing module 30 generates corresponding behavior event summary information according to the encrypted behavior event information, an encryption module 40 is further used for performing secondary encryption according to the behavior event summary information to form encrypted summary information, then a block chain management module 50 acquires the timestamp information, and stores the encrypted behavior event information and the encrypted summary information into a storage node of a security block chain, and finally the processing module 30 is further used for respectively linking a behavior event server, a judicial identification center server and a network arbitration server as nodes into the security block chain, and synchronizes data among the nodes so as to protect the authenticity of the material through the non-tampering characteristic of the block chain without setting a professional notarization person to notarize the contract, and when the encryption module 40 encrypts the contract to generate the encrypted behavior event information, the first hash algorithm encryption unit 41 encrypts the contract through the hash algorithm to form the encrypted behavior event information and the behavior event information decryption key, and then the right assignment unit 42 acquires the right assignment information, and when the encryption module 40 is further used to perform the secondary encryption according to the behavior event digest information to form the encrypted digest information, the second hash algorithm encryption unit 43 encrypts the behavior event digest information through the hash algorithm to form the encrypted behavior event digest information and the behavior event digest information decryption key, and the right assignment unit 42 acquires the right assignment information, and the behavior event summary information decryption key is sent to the corresponding server terminal according to the authority distribution information, and the method for sending the corresponding decryption key to the corresponding server terminal according to the authority distribution information can enable the server corresponding to the authority information to check the data corresponding to the authority of the server through the corresponding decryption key, so that when an encrypted contract needs to be checked and re-signed after a few years by a company A and a company B, the contract information which is uploaded at the beginning can be obtained and re-signed and uploaded only by uploading the behavior event information decryption key in the corresponding server, and after the system judges and confirms that the two uploaded contracts are consistent, the contract signing can be completed, and the use of a user and the evidence obtaining after the subsequent contracts are taken out are facilitated.
In the description of the present invention, it should be noted that the terms "vertical", "upper", "lower", "horizontal", and the like indicate orientations or positional relationships based on those shown in the drawings, and are only for convenience of describing the present invention and simplifying the description, but do not indicate or imply that the referred device or element must have a specific orientation, be constructed in a specific orientation, and be operated, and thus, should not be construed as limiting the present invention.
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly and may, for example, be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
Claims (8)
1. A block chain-based self-certification notarization method is characterized by comprising the following steps:
acquiring behavior event information of a user;
encrypting the behavior event information to generate encrypted behavior event information;
generating corresponding behavior event abstract information according to the encrypted behavior event information;
performing secondary encryption according to the behavior event abstract information to form encrypted abstract information;
acquiring the timestamp information, and storing the encrypted behavior event information and the encrypted summary information into a storage node of a storage block chain;
and taking a notarization server, a judicial identification center server and a network arbitration server as nodes to be respectively linked and accessed into the security block chain, and synchronizing data among the nodes.
2. The block chain-based self-certification notarization method as claimed in claim 1, wherein the act event information is encrypted to generate encrypted act event information, specifically including;
encrypting the behavior event information through a Hash algorithm to form encrypted behavior event information and a behavior event information decryption key;
and acquiring authority distribution information, and sending the behavior event information decryption key to a corresponding server terminal according to the authority distribution information.
3. The block chain-based self-certification notarization method as claimed in claim 1, wherein the secondary encryption is performed according to the behavior event digest information to form encrypted digest information, specifically including;
encrypting the behavior event abstract information through a Hash algorithm to form encrypted behavior event abstract information and a behavior event abstract information decryption key;
and acquiring authority distribution information, and sending the behavior event summary information decryption key to a corresponding server terminal according to the authority distribution information.
4. The block chain-based self-certification notarization method as claimed in claim 1, wherein the notarization server, the judicial certification authority server and the network mediation server are used as nodes to link into the secure block chain respectively, and after synchronizing data among the nodes, further comprising:
acquiring secondary behavior event information uploaded by a user;
judging when the secondary behavior event information is consistent with the behavior event information;
and judging the secondary behavior event information to be correct information, and encrypting and storing the secondary behavior event information.
5. A block chain-based self-certification notarization system is characterized by comprising a signal acquisition module, a processing module, an encryption module and a block chain management module;
all modules are connected with each other;
the signal acquisition module is used for acquiring behavior event information uploaded by a user;
the encryption module is used for encrypting the behavior event information so as to generate encrypted behavior event information;
the processing module is used for generating corresponding behavior event summary information according to the encrypted behavior event information;
the encryption module is also used for carrying out secondary encryption according to the behavior event summary information to form encrypted summary information;
the block chain management module is used for acquiring the timestamp information and storing the acquired encrypted behavior event information and the encrypted summary information into a storage node of a security block chain;
the processing module is also used for taking a notarization server, a judicial evaluation center server and a network arbitration server as nodes to be respectively linked and accessed into the security block chain, and synchronizing data among the nodes.
6. The block chain-based self-certification notarization system of claim 5 wherein the encryption module comprises a first hash algorithm encryption unit and a rights assignment unit,
the first hash algorithm encryption unit is connected with the authority distribution unit;
the encryption module is configured to encrypt the behavior event information, so as to generate encrypted behavior event information, and specifically includes:
the first Hash algorithm encryption unit is used for encrypting the behavior event information through a Hash algorithm so as to form encrypted behavior event information and a behavior event information decryption key;
and the authority distribution unit is used for acquiring authority distribution information and sending the behavior event information decryption key to a corresponding server terminal according to the authority distribution information.
7. The block chain based self-certifying notarization system as claimed in claim 5 wherein said encryption module further comprises a second hash algorithm encryption unit;
the second hash algorithm encryption unit is connected with the authority distribution unit;
the encryption module is further configured to perform secondary encryption according to the behavior event summary information to form encrypted summary information, and specifically includes:
the second hash algorithm encryption unit is used for encrypting the behavior event summary information through a hash algorithm so as to form encrypted behavior event summary information and a behavior event summary information decryption key;
and the authority distribution unit is also used for acquiring authority distribution information and sending the behavior event summary information decryption key to a corresponding server terminal according to the authority distribution information.
8. The block-chain-based self-certification notarization system as claimed in claim 5 wherein the processing module is further configured to link a behavioral event server, a judicial certification authority server and a network mediation server as nodes into the security block chain, respectively, and further comprising, after synchronizing data among the nodes:
the signal acquisition module is also used for acquiring secondary behavior event information uploaded by a user;
the processing module is further configured to determine when the secondary behavior event information is consistent with the behavior event information;
the processing module is further used for judging the secondary behavior event information to be correct information and encrypting and storing the secondary behavior event information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010005764.5A CN111241558A (en) | 2020-01-03 | 2020-01-03 | Self-certification notarization method and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010005764.5A CN111241558A (en) | 2020-01-03 | 2020-01-03 | Self-certification notarization method and system based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111241558A true CN111241558A (en) | 2020-06-05 |
Family
ID=70877623
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010005764.5A Pending CN111241558A (en) | 2020-01-03 | 2020-01-03 | Self-certification notarization method and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111241558A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111625874A (en) * | 2020-07-30 | 2020-09-04 | 杭州智诚惠通科技有限公司 | Cloud-based super-data tamper-proofing method based on block chain technology |
CN114124557A (en) * | 2021-11-30 | 2022-03-01 | 袁林英 | Information security access control method based on big data |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102339370A (en) * | 2011-09-14 | 2012-02-01 | 福建伊时代信息科技股份有限公司 | Preservation method for electronic file, preservation system and verification system thereof |
CN106934619A (en) * | 2017-03-13 | 2017-07-07 | 杭州复杂美科技有限公司 | A kind of method and system of transaction record |
CN109492426A (en) * | 2018-10-09 | 2019-03-19 | 重庆易保全网络科技有限公司 | Security method, device, storage medium and server based on block chain |
-
2020
- 2020-01-03 CN CN202010005764.5A patent/CN111241558A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102339370A (en) * | 2011-09-14 | 2012-02-01 | 福建伊时代信息科技股份有限公司 | Preservation method for electronic file, preservation system and verification system thereof |
CN106934619A (en) * | 2017-03-13 | 2017-07-07 | 杭州复杂美科技有限公司 | A kind of method and system of transaction record |
CN109492426A (en) * | 2018-10-09 | 2019-03-19 | 重庆易保全网络科技有限公司 | Security method, device, storage medium and server based on block chain |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111625874A (en) * | 2020-07-30 | 2020-09-04 | 杭州智诚惠通科技有限公司 | Cloud-based super-data tamper-proofing method based on block chain technology |
CN114124557A (en) * | 2021-11-30 | 2022-03-01 | 袁林英 | Information security access control method based on big data |
CN114124557B (en) * | 2021-11-30 | 2024-05-14 | 袁林英 | Information security access control method based on big data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112863629B (en) | Block chain-based medical electronic medical record distributed management system and preparation method thereof | |
CN109409122A (en) | File memory method and its electronic equipment, storage medium | |
CN111368324A (en) | Credible electronic license platform system based on block chain and authentication method thereof | |
Thompson | The preservation of digital signatures on the blockchain | |
CN114266681A (en) | Electronic contract signing method, system, storage medium and computing equipment | |
US20210192012A1 (en) | Right holder terminal, user terminal, right holder program, user program, content utilization system, and content utilization method | |
CN110351232A (en) | Camera safe encryption method and system | |
CN109858259A (en) | The data protection of community health service alliance and sharing method based on HyperLedger Fabric | |
CN111241558A (en) | Self-certification notarization method and system based on block chain | |
CN111916217A (en) | Block chain-based medical data management method, system, storage medium and terminal | |
CN110602079B (en) | Scientific research data uploading and storing method based on block chain technology hierarchical control | |
CN109714169B (en) | Data credible circulation platform based on strict authorization and circulation method thereof | |
WO2022177204A1 (en) | Did-based decentralized system for storing and sharing user data | |
CN115567312B (en) | Alliance chain data authority management system and method capable of meeting various scenes | |
CN111639952A (en) | Returned goods checking method, returned goods checking system, returned goods checking server and returned goods checking terminal based on block chain | |
CN106548059A (en) | The method of teacher, head of a family's mobile terminal and head of a family's authentication | |
CN110874493A (en) | Block chain-based enterprise data tamper-proofing method | |
CN113626456A (en) | File data consistency maintaining system and method based on block chain technology | |
CN112422522A (en) | Medical data safety sharing method based on block chain | |
CN115883214A (en) | Electronic medical data sharing system and method based on alliance chain and CP-ABE | |
WO2023095967A1 (en) | Remote-interaction large document access system in which blockchain-based did service, ipfs-based data sharing technology and private key distributed storage technology are combined | |
CN115396096A (en) | Encryption and decryption method and protection system for secret file based on national cryptographic algorithm | |
CN110970120B (en) | Family doctor management system and method based on block chain | |
CN116561182B (en) | Power data storage method and system based on block chain | |
AU774704B2 (en) | Electronic information inquiring method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200605 |
|
RJ01 | Rejection of invention patent application after publication |