CN111241558A - Self-certification notarization method and system based on block chain - Google Patents

Self-certification notarization method and system based on block chain Download PDF

Info

Publication number
CN111241558A
CN111241558A CN202010005764.5A CN202010005764A CN111241558A CN 111241558 A CN111241558 A CN 111241558A CN 202010005764 A CN202010005764 A CN 202010005764A CN 111241558 A CN111241558 A CN 111241558A
Authority
CN
China
Prior art keywords
information
behavior event
event information
encrypted
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010005764.5A
Other languages
Chinese (zh)
Inventor
高嵩
吴诗展
樊树娟
蒋占伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing MedpAi Intelligent Technology Co ltd
Original Assignee
Beijing MedpAi Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing MedpAi Intelligent Technology Co ltd filed Critical Beijing MedpAi Intelligent Technology Co ltd
Priority to CN202010005764.5A priority Critical patent/CN111241558A/en
Publication of CN111241558A publication Critical patent/CN111241558A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Automation & Control Theory (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the field of block chains, and particularly provides a self-certification notarization method and a self-certification notarization system based on a block chain, wherein the self-certification notarization method comprises the steps of obtaining behavior event information uploaded by a user, encrypting the behavior event information to generate encrypted behavior event information, generating corresponding behavior event summary information according to the encrypted behavior event information, and performing secondary encryption according to the behavior event summary information to form encrypted summary information; and acquiring the timestamp information, storing the encrypted behavior event information and the encrypted abstract information into a storage node of a security block chain, and synchronizing data among the nodes so as to achieve the notarization effect. By the method and the system, authenticity of the behavior event and data is protected by using the non-falsifiable characteristic of the block chain in a mode of uploading a certain behavior event and material to the block chain system, and professional notarization personnel are not needed to be arranged, so that evidence storage of a user and evidence collection of a judicial institution are facilitated.

Description

Self-certification notarization method and system based on block chain
Technical Field
The invention relates to the field of block chains, in particular to a self-certification notarization system and a self-certification notarization method based on a block chain.
Background
The block chain is a decentralized protocol, can safely store digital currency transactions or other data, can not be forged and falsified, has high public trust, can automatically execute intelligent contracts, and does not need to be audited by any centralized organization.
The existing notarization generally adopts an offline notarization process, and the process is generally as follows: the consignor carries the notarization material to a specific notarization place and completes the notarization of the consignment item under the authentication and investigation of the notarization member, however, the notarization method has the following problems: 1 notarization requires the assistance of specific time, place and professional; 2, establishing a continuously credible state for professional literacy of professionals; the user still needs to carry the data to a specific notarization place for notarization, so that the user is obviously inconvenient to rapidly notarize, and excessive time is wasted.
Disclosure of Invention
The invention mainly aims to provide a block chain-based self-certification notarization system and a block chain-based self-certification notarization method which are simple in process and capable of improving notarization reliability
In order to achieve the purpose, the invention adopts the technical scheme that:
in a first aspect, the present invention provides a block chain-based self-certification notarization method, specifically including:
acquiring behavior event information uploaded by a user;
encrypting the behavior event information to generate encrypted behavior event information;
generating corresponding behavior event abstract information according to the encrypted behavior event information;
performing secondary encryption according to the behavior event abstract information to form encrypted abstract information;
acquiring the timestamp information, and storing the encrypted behavior event information and the encrypted summary information into a storage node of a storage block chain;
and taking a notarization server, a judicial identification center server and a network arbitration server as nodes to be respectively linked and accessed into the security block chain, and synchronizing data among the nodes.
Further, encrypting the behavior event information to generate encrypted behavior event information specifically includes;
encrypting the behavior event information through a Hash algorithm to form encrypted behavior event information and a behavior event information decryption key;
and acquiring authority distribution information, and sending the behavior event information decryption key to a corresponding server terminal according to the authority distribution information.
Further, performing secondary encryption according to the behavior event summary information to form encrypted summary information, which specifically includes;
encrypting the behavior event abstract information through a Hash algorithm to form encrypted behavior event abstract information and a behavior event abstract information decryption key;
and acquiring authority distribution information, and sending the behavior event summary information decryption key to a corresponding server terminal according to the authority distribution information.
Further, the link accessing the notarization server, the judicial identification center server and the network arbitration server as nodes to the security block chain respectively, and after synchronizing data among the nodes, the method further includes:
acquiring secondary behavior event information uploaded by a user;
judging when the secondary behavior event information is consistent with the behavior event information;
and judging the secondary behavior event information to be correct information, and encrypting and storing the secondary behavior event information.
In a second aspect, the present invention further provides a self-certification notarization system based on a block chain, which includes a signal acquisition module, a processing module, an encryption module and a block chain management module;
all modules are connected with each other;
the signal acquisition module is used for acquiring behavior event information uploaded by a user;
the encryption module is used for encrypting the behavior event information so as to generate encrypted behavior event information;
the processing module is used for generating corresponding behavior event summary information according to the encrypted behavior event information;
the encryption module is also used for carrying out secondary encryption according to the behavior event summary information to form encrypted summary information;
the block chain management module is used for acquiring the timestamp information and storing the acquired encrypted behavior event information and the encrypted summary information into a storage node of a security block chain;
the processing module is also used for taking a behavior event server, a judicial appraisal center server and a network arbitration server as nodes to be respectively linked and accessed into the security block chain, and synchronizing data among the nodes.
Further, the encryption module comprises a first hash algorithm encryption unit and a permission allocation unit,
the first hash algorithm encryption unit is connected with the authority distribution unit;
the encryption module is configured to encrypt the behavior event information, so as to generate encrypted behavior event information, and specifically includes:
the first Hash algorithm encryption unit is used for encrypting the behavior event information through a Hash algorithm so as to form encrypted behavior event information and a behavior event information decryption key;
and the authority distribution unit is used for acquiring authority distribution information and sending the behavior event information decryption key to a corresponding server terminal according to the authority distribution information.
Further, the encryption module further comprises a second hash algorithm encryption unit;
the second hash algorithm encryption unit is connected with the authority distribution unit;
the encryption module is further configured to perform secondary encryption according to the behavior event summary information to form encrypted summary information, and specifically includes:
the second hash algorithm encryption unit is used for encrypting the behavior event summary information through a hash algorithm so as to form encrypted behavior event summary information and a behavior event summary information decryption key;
and the authority distribution unit is also used for acquiring authority distribution information and sending the behavior event summary information decryption key to a corresponding server terminal according to the authority distribution information.
Further, the processing module is further configured to link, as nodes, a behavior event server, a judicial assessment center server, and a network mediation server to the security block chain, and after synchronizing data among the nodes, further includes:
the signal acquisition module is also used for acquiring secondary behavior event information uploaded by a user;
the processing module is further configured to determine when the secondary behavior event information is consistent with the behavior event information;
the processing module is further used for judging the secondary behavior event information to be correct information and encrypting and storing the secondary behavior event information.
By adopting the method and the system, the authenticity of the behavior event and the data is protected by utilizing the characteristic that the block chain cannot be tampered by uploading a certain behavior event and material to the block chain system, and professional notarization personnel are not needed to be arranged, so that the existence of a user is facilitated, the evidence obtaining of a judicial institution is facilitated, and the problems that notarization is required to be carried out at specific time and place and the assistance of professional personnel in the prior art and the professional literacy of the professional personnel needs to be established in a continuous and credible state are solved; the method is used for carrying the data to a specific notarization place for notarization, obviously and inconveniently realizing rapid notarization, thereby wasting too much time, and realizes sending the corresponding decryption keys to the corresponding server terminals by multiple encryption through a Hash algorithm and then according to the preset authority information, so that the server corresponding to the authority information can check the data corresponding to the authority of the server through the corresponding decryption keys, thereby facilitating the management of the data.
Drawings
FIG. 1 is a flowchart of a method of an embodiment of a block chain-based self-certifying notarization method of the present invention;
FIG. 2 is a flowchart of a self-certifying method for block chaining in accordance with another embodiment of the present invention;
FIG. 3 is a flowchart of a block chain-based self-certifying method according to another embodiment of the present invention;
FIG. 4 is a flowchart of a block chain-based self-certifying method according to another embodiment of the present invention;
FIG. 5 is a system diagram of an embodiment of a block chain based self-certification notarization system of the present invention;
FIG. 6 is a block diagram of an encryption module according to an embodiment of the present invention;
the number designations in the figures are: 10-a signal acquisition module, 20-a processing module, 30-a block chain management module, 40-an encryption module, 41-a first hash algorithm encryption unit, 42-a right distribution unit and 43-a second hash algorithm encryption unit.
Detailed Description
The following further describes embodiments of the present invention with reference to the drawings. It should be noted that the description of the embodiments is provided to help understanding of the present invention, but the present invention is not limited thereto. In addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
In a first aspect, as shown in fig. 1, the present invention provides a block chain-based self-certification notarization method, which specifically includes:
s100, acquiring behavior event information uploaded by a user;
s200, encrypting the behavior event information to generate encrypted behavior event information;
s300, generating corresponding behavior event abstract information according to the encrypted behavior event information;
s400, performing secondary encryption according to the behavior event summary information to form encrypted summary information;
s500, acquiring the timestamp information, and storing the encrypted behavior event information and the encrypted summary information into a storage node of a storage block chain;
and S600, taking the notarization department server, the judicial identification center server and the network arbitration server as nodes to be respectively linked and accessed into the security block chain, and synchronizing data among the nodes.
Further, as shown in fig. 2, the step S200 specifically includes;
s201, encrypting the behavior event information through a Hash algorithm to form encrypted behavior event information and a behavior event information decryption key;
s201, acquiring authority distribution information, and sending the behavior event information decryption key to a corresponding server terminal according to the authority distribution information.
Further, as shown in fig. 3, the step S400 specifically includes;
s401, encrypting the behavior event summary information through a Hash algorithm to form encrypted behavior event summary information and a behavior event summary information decryption key;
s402, acquiring authority distribution information, and sending the behavior event summary information decryption key to a corresponding server terminal according to the authority distribution information.
Further, as shown in fig. 4, after the step S600, the method further includes:
s601, acquiring secondary behavior event information uploaded by a user;
s602, judging when the secondary behavior event information is consistent with the behavior event information;
and S603, judging the secondary behavior event information to be correct information, and encrypting and storing the secondary behavior event information.
In a second aspect, as shown in fig. 5, the present invention further provides a self-certified notarization system based on a blockchain, which includes a signal obtaining module 10, a processing module 20, a blockchain management module 30, and an encryption module 40;
all modules are connected with each other;
the signal acquisition module 10 is used for acquiring behavior event information uploaded by a user;
the encryption module 20 is configured to encrypt the behavior event information, so as to generate encrypted behavior event information;
the processing module 30 is configured to generate corresponding behavior event summary information according to the encrypted behavior event information;
the encryption module 40 is further configured to perform secondary encryption according to the behavior event summary information to form encrypted summary information;
the block chain management module 50 is configured to obtain the timestamp information, and store the obtained encrypted behavior event information and the encrypted digest information in a storage node of a secure block chain;
the processing module 30 is further configured to link the notarization server, the judicial identification center server, and the network mediation server as nodes into the security block chain, respectively, and synchronize data among the nodes.
Further, as shown in fig. 6, the encryption module 40 includes a first hash algorithm encryption unit 41 and a right assignment unit 42, where the first hash algorithm encryption unit 41 is connected to the right assignment unit 42;
the encryption module 40 is configured to encrypt the behavior event information, so as to generate encrypted behavior event information, which specifically includes:
the first hash algorithm encryption unit 41 is configured to encrypt the behavior event information by a hash algorithm, so as to form encrypted notary information and a behavior event information decryption key;
the authority distributing unit 42 is configured to obtain authority distribution information, and send the behavior event information decryption key to a corresponding server terminal according to the authority distribution information.
Further, as shown in fig. 6, the encryption module further includes a second hash algorithm encryption unit 43;
the second hash algorithm encryption unit 43 is connected with the authority distribution unit 42;
the encryption module 40 is further configured to perform secondary encryption according to the behavior event summary information to form encrypted summary information, which specifically includes:
the second hash algorithm encryption unit 43 is configured to encrypt the behavior event summary information by a hash algorithm, so as to form encrypted behavior event summary information and a behavior event summary information decryption key;
the authority distributing unit 42 is further configured to obtain authority distribution information, and send the behavior event summary information decryption key to a corresponding server terminal according to the authority distribution information.
Further, the processing module 30 is further configured to link the behavioral event server, the judicial assessment center server, and the network mediation server as nodes into the security block chain, and after synchronizing data among the nodes, further includes:
the signal acquisition module 10 is further configured to acquire secondary behavior event information uploaded by a user;
the processing module 30 is further configured to determine that the secondary behavior event information is consistent with the behavior event information;
the processing module 30 is further configured to determine that the secondary behavior event information is correct information, and encrypt and store the secondary behavior event information.
In a specific application scenario of the invention, a company a and a company b confirm to sign a contract a, then the company a and the company b upload the contract to a system, then a signal acquisition module 10 acquires the contract uploaded by the company a and the company b, then an encryption module 20 encrypts the contract to generate encrypted behavior event information, then a processing module 30 generates corresponding behavior event summary information according to the encrypted behavior event information, an encryption module 40 is further used for performing secondary encryption according to the behavior event summary information to form encrypted summary information, then a block chain management module 50 acquires the timestamp information, and stores the encrypted behavior event information and the encrypted summary information into a storage node of a security block chain, and finally the processing module 30 is further used for respectively linking a behavior event server, a judicial identification center server and a network arbitration server as nodes into the security block chain, and synchronizes data among the nodes so as to protect the authenticity of the material through the non-tampering characteristic of the block chain without setting a professional notarization person to notarize the contract, and when the encryption module 40 encrypts the contract to generate the encrypted behavior event information, the first hash algorithm encryption unit 41 encrypts the contract through the hash algorithm to form the encrypted behavior event information and the behavior event information decryption key, and then the right assignment unit 42 acquires the right assignment information, and when the encryption module 40 is further used to perform the secondary encryption according to the behavior event digest information to form the encrypted digest information, the second hash algorithm encryption unit 43 encrypts the behavior event digest information through the hash algorithm to form the encrypted behavior event digest information and the behavior event digest information decryption key, and the right assignment unit 42 acquires the right assignment information, and the behavior event summary information decryption key is sent to the corresponding server terminal according to the authority distribution information, and the method for sending the corresponding decryption key to the corresponding server terminal according to the authority distribution information can enable the server corresponding to the authority information to check the data corresponding to the authority of the server through the corresponding decryption key, so that when an encrypted contract needs to be checked and re-signed after a few years by a company A and a company B, the contract information which is uploaded at the beginning can be obtained and re-signed and uploaded only by uploading the behavior event information decryption key in the corresponding server, and after the system judges and confirms that the two uploaded contracts are consistent, the contract signing can be completed, and the use of a user and the evidence obtaining after the subsequent contracts are taken out are facilitated.
In the description of the present invention, it should be noted that the terms "vertical", "upper", "lower", "horizontal", and the like indicate orientations or positional relationships based on those shown in the drawings, and are only for convenience of describing the present invention and simplifying the description, but do not indicate or imply that the referred device or element must have a specific orientation, be constructed in a specific orientation, and be operated, and thus, should not be construed as limiting the present invention.
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly and may, for example, be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.

Claims (8)

1. A block chain-based self-certification notarization method is characterized by comprising the following steps:
acquiring behavior event information of a user;
encrypting the behavior event information to generate encrypted behavior event information;
generating corresponding behavior event abstract information according to the encrypted behavior event information;
performing secondary encryption according to the behavior event abstract information to form encrypted abstract information;
acquiring the timestamp information, and storing the encrypted behavior event information and the encrypted summary information into a storage node of a storage block chain;
and taking a notarization server, a judicial identification center server and a network arbitration server as nodes to be respectively linked and accessed into the security block chain, and synchronizing data among the nodes.
2. The block chain-based self-certification notarization method as claimed in claim 1, wherein the act event information is encrypted to generate encrypted act event information, specifically including;
encrypting the behavior event information through a Hash algorithm to form encrypted behavior event information and a behavior event information decryption key;
and acquiring authority distribution information, and sending the behavior event information decryption key to a corresponding server terminal according to the authority distribution information.
3. The block chain-based self-certification notarization method as claimed in claim 1, wherein the secondary encryption is performed according to the behavior event digest information to form encrypted digest information, specifically including;
encrypting the behavior event abstract information through a Hash algorithm to form encrypted behavior event abstract information and a behavior event abstract information decryption key;
and acquiring authority distribution information, and sending the behavior event summary information decryption key to a corresponding server terminal according to the authority distribution information.
4. The block chain-based self-certification notarization method as claimed in claim 1, wherein the notarization server, the judicial certification authority server and the network mediation server are used as nodes to link into the secure block chain respectively, and after synchronizing data among the nodes, further comprising:
acquiring secondary behavior event information uploaded by a user;
judging when the secondary behavior event information is consistent with the behavior event information;
and judging the secondary behavior event information to be correct information, and encrypting and storing the secondary behavior event information.
5. A block chain-based self-certification notarization system is characterized by comprising a signal acquisition module, a processing module, an encryption module and a block chain management module;
all modules are connected with each other;
the signal acquisition module is used for acquiring behavior event information uploaded by a user;
the encryption module is used for encrypting the behavior event information so as to generate encrypted behavior event information;
the processing module is used for generating corresponding behavior event summary information according to the encrypted behavior event information;
the encryption module is also used for carrying out secondary encryption according to the behavior event summary information to form encrypted summary information;
the block chain management module is used for acquiring the timestamp information and storing the acquired encrypted behavior event information and the encrypted summary information into a storage node of a security block chain;
the processing module is also used for taking a notarization server, a judicial evaluation center server and a network arbitration server as nodes to be respectively linked and accessed into the security block chain, and synchronizing data among the nodes.
6. The block chain-based self-certification notarization system of claim 5 wherein the encryption module comprises a first hash algorithm encryption unit and a rights assignment unit,
the first hash algorithm encryption unit is connected with the authority distribution unit;
the encryption module is configured to encrypt the behavior event information, so as to generate encrypted behavior event information, and specifically includes:
the first Hash algorithm encryption unit is used for encrypting the behavior event information through a Hash algorithm so as to form encrypted behavior event information and a behavior event information decryption key;
and the authority distribution unit is used for acquiring authority distribution information and sending the behavior event information decryption key to a corresponding server terminal according to the authority distribution information.
7. The block chain based self-certifying notarization system as claimed in claim 5 wherein said encryption module further comprises a second hash algorithm encryption unit;
the second hash algorithm encryption unit is connected with the authority distribution unit;
the encryption module is further configured to perform secondary encryption according to the behavior event summary information to form encrypted summary information, and specifically includes:
the second hash algorithm encryption unit is used for encrypting the behavior event summary information through a hash algorithm so as to form encrypted behavior event summary information and a behavior event summary information decryption key;
and the authority distribution unit is also used for acquiring authority distribution information and sending the behavior event summary information decryption key to a corresponding server terminal according to the authority distribution information.
8. The block-chain-based self-certification notarization system as claimed in claim 5 wherein the processing module is further configured to link a behavioral event server, a judicial certification authority server and a network mediation server as nodes into the security block chain, respectively, and further comprising, after synchronizing data among the nodes:
the signal acquisition module is also used for acquiring secondary behavior event information uploaded by a user;
the processing module is further configured to determine when the secondary behavior event information is consistent with the behavior event information;
the processing module is further used for judging the secondary behavior event information to be correct information and encrypting and storing the secondary behavior event information.
CN202010005764.5A 2020-01-03 2020-01-03 Self-certification notarization method and system based on block chain Pending CN111241558A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010005764.5A CN111241558A (en) 2020-01-03 2020-01-03 Self-certification notarization method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010005764.5A CN111241558A (en) 2020-01-03 2020-01-03 Self-certification notarization method and system based on block chain

Publications (1)

Publication Number Publication Date
CN111241558A true CN111241558A (en) 2020-06-05

Family

ID=70877623

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010005764.5A Pending CN111241558A (en) 2020-01-03 2020-01-03 Self-certification notarization method and system based on block chain

Country Status (1)

Country Link
CN (1) CN111241558A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111625874A (en) * 2020-07-30 2020-09-04 杭州智诚惠通科技有限公司 Cloud-based super-data tamper-proofing method based on block chain technology
CN114124557A (en) * 2021-11-30 2022-03-01 袁林英 Information security access control method based on big data

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102339370A (en) * 2011-09-14 2012-02-01 福建伊时代信息科技股份有限公司 Preservation method for electronic file, preservation system and verification system thereof
CN106934619A (en) * 2017-03-13 2017-07-07 杭州复杂美科技有限公司 A kind of method and system of transaction record
CN109492426A (en) * 2018-10-09 2019-03-19 重庆易保全网络科技有限公司 Security method, device, storage medium and server based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102339370A (en) * 2011-09-14 2012-02-01 福建伊时代信息科技股份有限公司 Preservation method for electronic file, preservation system and verification system thereof
CN106934619A (en) * 2017-03-13 2017-07-07 杭州复杂美科技有限公司 A kind of method and system of transaction record
CN109492426A (en) * 2018-10-09 2019-03-19 重庆易保全网络科技有限公司 Security method, device, storage medium and server based on block chain

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111625874A (en) * 2020-07-30 2020-09-04 杭州智诚惠通科技有限公司 Cloud-based super-data tamper-proofing method based on block chain technology
CN114124557A (en) * 2021-11-30 2022-03-01 袁林英 Information security access control method based on big data
CN114124557B (en) * 2021-11-30 2024-05-14 袁林英 Information security access control method based on big data

Similar Documents

Publication Publication Date Title
CN112863629B (en) Block chain-based medical electronic medical record distributed management system and preparation method thereof
CN109409122A (en) File memory method and its electronic equipment, storage medium
CN111368324A (en) Credible electronic license platform system based on block chain and authentication method thereof
Thompson The preservation of digital signatures on the blockchain
CN114266681A (en) Electronic contract signing method, system, storage medium and computing equipment
US20210192012A1 (en) Right holder terminal, user terminal, right holder program, user program, content utilization system, and content utilization method
CN110351232A (en) Camera safe encryption method and system
CN109858259A (en) The data protection of community health service alliance and sharing method based on HyperLedger Fabric
CN111241558A (en) Self-certification notarization method and system based on block chain
CN111916217A (en) Block chain-based medical data management method, system, storage medium and terminal
CN110602079B (en) Scientific research data uploading and storing method based on block chain technology hierarchical control
CN109714169B (en) Data credible circulation platform based on strict authorization and circulation method thereof
WO2022177204A1 (en) Did-based decentralized system for storing and sharing user data
CN115567312B (en) Alliance chain data authority management system and method capable of meeting various scenes
CN111639952A (en) Returned goods checking method, returned goods checking system, returned goods checking server and returned goods checking terminal based on block chain
CN106548059A (en) The method of teacher, head of a family's mobile terminal and head of a family's authentication
CN110874493A (en) Block chain-based enterprise data tamper-proofing method
CN113626456A (en) File data consistency maintaining system and method based on block chain technology
CN112422522A (en) Medical data safety sharing method based on block chain
CN115883214A (en) Electronic medical data sharing system and method based on alliance chain and CP-ABE
WO2023095967A1 (en) Remote-interaction large document access system in which blockchain-based did service, ipfs-based data sharing technology and private key distributed storage technology are combined
CN115396096A (en) Encryption and decryption method and protection system for secret file based on national cryptographic algorithm
CN110970120B (en) Family doctor management system and method based on block chain
CN116561182B (en) Power data storage method and system based on block chain
AU774704B2 (en) Electronic information inquiring method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200605

RJ01 Rejection of invention patent application after publication