CN111832046A - Trusted data evidence storing method based on block chain technology - Google Patents

Trusted data evidence storing method based on block chain technology Download PDF

Info

Publication number
CN111832046A
CN111832046A CN202010634652.6A CN202010634652A CN111832046A CN 111832046 A CN111832046 A CN 111832046A CN 202010634652 A CN202010634652 A CN 202010634652A CN 111832046 A CN111832046 A CN 111832046A
Authority
CN
China
Prior art keywords
client
certificate
data
information
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010634652.6A
Other languages
Chinese (zh)
Other versions
CN111832046B (en
Inventor
彭海杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongtong Uniform Chuangfa Science And Technology Co ltd
Original Assignee
Zhongtong Uniform Chuangfa Science And Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongtong Uniform Chuangfa Science And Technology Co ltd filed Critical Zhongtong Uniform Chuangfa Science And Technology Co ltd
Priority to CN202010634652.6A priority Critical patent/CN111832046B/en
Publication of CN111832046A publication Critical patent/CN111832046A/en
Application granted granted Critical
Publication of CN111832046B publication Critical patent/CN111832046B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

Embodiments of the present disclosure provide a method, system, device, and computer-readable storage medium for trusted data attestation based on a blockchain technique. The method comprises the steps of receiving certificate storing request information sent by a client; the client is a client which completes public key exchange with the data storage system; verifying the certificate storing request information; and if the verification is passed, storing the certificate storing request information through a block chain system. In this way, data can be retained as data credentialed by multiple parties.

Description

Trusted data evidence storing method based on block chain technology
Technical Field
Embodiments of the present disclosure relate generally to the field of data security technologies, and more particularly, to a trusted data attestation method, system, device, and computer-readable storage medium based on a blockchain technology.
Background
Blockchains are a term of art in information technology. Essentially, a blockchain system is a shared database, and the data or information stored in the shared database has the characteristics of being unforgeable, having no trace in the whole process, having no trace in the back, having no transparent disclosure, having no collective maintenance, and the like. The chunk data has a time stamp for marking the chunk generation time. The security of the user data depends on the public-private key hierarchy used. The block chain technology provides a trust basis, creates a reliable cooperation mechanism and has wide application prospect.
As can be seen, the confidence level of the data or information stored in the blockchain system is high.
With the popularization of computer and network technologies, electronic commerce and trade activities and many other network-based interpersonal communications are emerging, and electronic documents (electronic data) have become important carriers for transferring information and recording facts. In these aspects, once a dispute or case occurs, the related electronic file becomes important evidence.
However, the existing electronic evidence is difficult to be approved by the public certificate authority, the judicial authority and the like due to the defects of easy extinction and easy tampering, meanwhile, faults such as flaws, breakpoints, incomplete evidence and the like are easily caused in the transmission process, and in the transferring and transferring processes of electronic data generation, solidification, evidence storage, storage and subsequent evidence use, the risk of data tampering is increased, and the integrity is damaged.
In summary, how to store and query electronic data by using block chains is a problem which needs to be solved urgently at present.
Disclosure of Invention
The present disclosure is directed to solving at least one of the technical problems of the related art or related art.
To this end, in a first aspect of the present disclosure, a trusted data attestation method based on a blockchain technique is provided. The method comprises the following steps:
receiving certificate storage request information sent by a client; the client is a client which completes public key exchange with the data storage system;
verifying the certificate storing request information;
and if the verification is passed, storing the certificate storing request information through a block chain system.
Further, the certificate storing request information includes:
information content and a signature for the information content;
the information content is encrypted data, including video, audio and/or text data.
Further, the public key exchange includes:
when one client participating in the certificate storage is available, the client uploads signature information including a public key of the client and the public key to a data certificate storage system;
and the data certificate storing system receives the signature information which is sent by the client and comprises the self public key and the public key, and sends the self public key to the client to complete the public key exchange.
Further, the public key exchange includes:
when the number of the clients participating in the certificate storage is N, the client initiating the certificate storage sends a certificate storage request to other clients participating in the certificate storage; n is a positive integer greater than 1;
the other clients participating in the certificate storage respond to the certificate storage request and send signature information comprising own public keys to the client initiating the certificate storage;
the client initiating the deposit certificate uploads the signature information including the public key and the public key of the client, the received public keys of other clients participating in the deposit certificate and the corresponding signature information, which are sent by the other clients participating in the deposit certificate, to a data deposit certificate system;
and the data certificate storage system receives the information and sends the public key to each client participating in certificate storage to complete public key exchange.
Further, the verifying the certificate storing request information includes:
and the data certificate storing system verifies the certificate storing request information through the public key of the client participating in certificate storing.
Further, still include:
receiving a query request provided by a client;
the data deposit system sends a piece of information encrypted by the public key of the client to the client, the client decrypts the information by the private key of the client and sends the decrypted information to the data deposit system;
the data certification system verifies the received decrypted information, and if the verification is passed, the client can inquire the certified data.
Further, still include:
receiving a query request provided by a client;
the data deposit system sends a piece of information encrypted by a public key of the client and a private key of the client to the client, the client decrypts the information by the private key of the client and the public key of the data deposit system and sends the decrypted information to the data deposit system;
the data certification system verifies the received decrypted information, and if the verification is passed, the client can inquire the certified data.
In a second aspect of the present disclosure, a trusted data deposit system based on a block chain technology is provided, including a receiving module, a signature verification module, and a deposit module; wherein the content of the first and second substances,
the receiving module is used for receiving the certificate storing request information sent by the client;
the signature verification module is used for verifying the certificate storage request information;
and the certificate storage module is used for storing the certificate of the certificate storage request information passing the verification.
In a third aspect of the disclosure, an apparatus is presented, comprising:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the above-described methods according to the present disclosure.
In a fourth aspect of the disclosure, a computer-readable storage medium is provided, on which a computer program is stored, which program, when being executed by a processor, realizes the above-mentioned method as according to the disclosure.
The trusted data evidence storing method based on the block chain technology provided by the embodiment of the application receives evidence storing request information sent by a client; the client is a client which completes public key exchange with the data storage system; verifying the certificate storing request information; and if the verification is passed, the certificate storing request information is subjected to certificate storing through a block chain system, so that the information is reserved as the credible data certificate of multiple parties in the block chain.
It should be understood that the statements herein reciting aspects are not intended to limit the critical or essential features of the embodiments of the present disclosure, nor are they intended to limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. In the drawings, like or similar reference characters designate like or similar elements, and wherein:
FIG. 1 is an exemplary system architecture diagram in which one embodiment of the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of a method for trusted data attestation based on blockchain techniques in accordance with the present application;
fig. 3 is a schematic structural diagram of a computer system used for implementing the terminal device or the server according to the embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present disclosure more clear, the technical solutions of the embodiments of the present disclosure will be described clearly and completely with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are some, but not all embodiments of the present disclosure. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
In addition, the term "and/or" herein is only one kind of association relationship describing an associated object, and means that there may be three kinds of relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
It should be noted that the blockchain referred to in this application may be any one of a public chain, a federation chain, and a private chain.
Fig. 1 illustrates an exemplary system architecture 100 to which an embodiment of a block chain technology-based trusted data attestation method or system of the present application may be applied.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. Various communication client applications, such as a model training application, a video recognition application, a web browser application, social platform software, etc., may be installed on the terminal devices 101, 102, 103.
The terminal apparatuses 101, 102, and 103 may be hardware or software. When the terminal devices 101, 102, 103 are hardware, they may be various electronic devices having a display screen, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (movingpictureexpertgroupipauudio layer iii, mpeg audio layer 3), MP4 players (movingpictureexpertgroupipauudio layer iv, mpeg audio layer 4), laptop portable computers, desktop computers, and the like. When the terminal apparatuses 101, 102, 103 are software, they can be installed in the electronic apparatuses listed above. It may be implemented as multiple pieces of software or software modules (e.g., multiple pieces of software or software modules to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
When the terminals 101, 102, 103 are hardware, a video capture device may also be installed thereon. The video acquisition equipment can be various equipment capable of realizing the function of acquiring video, such as a camera, a sensor and the like. The user may capture video using a video capture device on the terminal 101, 102, 103.
The server 105 may be a server that provides various services, such as a background server that processes data displayed on the terminal devices 101, 102, 103.
The server may be hardware or software. When the server is hardware, it may be implemented as a distributed server cluster formed by multiple servers, or may be implemented as a single server. When the server is software, it may be implemented as multiple pieces of software or software modules (e.g., multiple pieces of software or software modules used to provide distributed services), or as a single piece of software or software module. And is not particularly limited herein.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. In particular, in the case where the target data does not need to be acquired from a remote place, the above system architecture may not include a network but only a terminal device or a server.
Fig. 2 is a flowchart illustrating a trusted data certification method based on a block chain technique according to an embodiment of the present application. As can be seen from fig. 2, the trusted data certification method based on the blockchain technology of the embodiment includes the following steps:
s210, receiving the certificate storing request information sent by the client.
In this embodiment, an executing entity (for example, the server shown in fig. 1) of the method for trusted data certification may acquire information sent by the client in a wired manner or a wireless connection manner.
Further, the execution main body may acquire information transmitted by an electronic device (for example, the terminal device shown in fig. 1) connected in communication therewith, or may be locally stored certificate information in advance.
Preferably, each user (client) and the smart contract on the data depository system generate a key pair independently in advance. Each key pair consists of a public key KPub and a private key KPriv. The public key is public and does not need to be kept secret, while the private key is proprietary to a person (client) or a server and needs to be kept and kept secret.
Optionally, the public key and the private key are paired for successful encryption and decryption in a public key hierarchy.
Optionally, in this scheme, all information (electronic file) sent by the sender includes a signature, and the receiver only processes information passing the signature verification.
Optionally, the signature comprises:
a sends information to B, A calculates the information abstract of the information first, then uses the private key of itself to encrypt the information abstract, the encrypted information abstract is the signature. That is, a encrypts the message digest with its own private key. All transmitted information in this application is signed using the above method. That is, in this scheme, all information (electronic file) sent by the sender includes the signature.
After B receives the information, it will use the same method as A to extract the said information abstract, then use A's public key to decrypt the signature, and compare with the information abstract calculated by itself, if they are the same, it shows that the information is sent from A to B. At the same time, a cannot deny the fact that it sends information to B. That is, the process of B decrypting the signature using the public key of a and comparing the digests to be consistent is called "signature verification". In the application, the receiver only processes the information passing the signature verification.
Further, the key may be generated using public key mechanisms such as RSA, DSA, elliptic curve, and the like.
Optionally, the secret key in the public key mechanism includes a public key and a private key.
Preferably, the clients in the scheme are all clients which complete public key exchange with the data storage and certification system.
Optionally, when there is one client participating in the certificate storage, the public key exchange includes:
the client uploads the signature information including the self public key and the public key to a data certificate storage system (intelligent contract), and the data certificate storage system receives the signature information including the self public key and the public key sent by the client and sends the self public key to the client to complete public key exchange.
Optionally, when there are N clients participating in the certificate storage, the public key exchange includes:
wherein N is a positive integer greater than 1;
the method comprises the steps that a client initiating the certificate storage sends a certificate storage request to other clients participating in the certificate storage, the other clients participating in the certificate storage respond to the certificate storage request and send signature information comprising a self public key to the client initiating the certificate storage, the client initiating the certificate storage uploads the signature information comprising the self public key and the public key and received public keys of the other clients participating in the certificate storage and corresponding signature information sent by the other clients participating in the certificate storage to a data certificate storage system (intelligent contract), and the data certificate storage system receives the information and sends the self public key to each client participating in the certificate storage to complete public key exchange.
Optionally, the client end that completes the public key exchange calls an intelligent contract on the data verification system to initiate the verification request information.
Further, the certificate storing request information includes:
information content and a signature for the information content;
the information content is encrypted data, including various forms of data such as video, audio and/or text.
And S220, verifying the certificate storing request information, and if the certificate storing request information passes the verification, storing the certificate through a block chain system.
Optionally, the data verification system (smart contract) verifies the signature of the received verification request information through the public key of the participating verification client to determine whether the information is sent by the participating verification user.
Specifically, the data verification system (intelligent contract) stores public keys of all the participating certificate-storing clients, and after receiving the certificate-storing request information, the data verification system verifies and signs the certificate-storing request information by using the stored public keys of the participating certificate-storing clients so as to detect whether all the users participating in certificate-storing submit signatures to the certificate-storing request information.
When the intelligent contract detects that all the users participating in the verification submit signatures to the information, namely, after the signatures pass, the intelligent contract stores the signature information of the client side into the block of the data system.
Further, still include:
and inquiring the certified information.
Optionally, the data certificate storage system is accessed by the query client through HTTPS by using a WEB browser, and simultaneously, a request for querying the certificate storage information is sent to the data certificate storage system, and the data certificate storage system performs public key exchange with the query client after receiving the request for querying the certificate storage information.
After the public key exchange is completed, the data storage certificate system encrypts a random character string (str) by using the public key of the query client to form a ciphertext (EN), the ciphertext is sent to the query client, the query client decrypts the EN by using the private key of the query client to obtain a data character string str2, the character string str2 is returned to the data storage certificate system, the data storage certificate system verifies the received decrypted information (str2), and if the str is the same as the str2, the data storage certificate system confirms that the query client has the exchanged public key (namely, the verification is passed).
If the data deposit system confirms that the inquiry client side has the public key sent by the inquiry client side, the inquiry client side can retrieve all deposit information related to the public key in the data deposit system to obtain the required deposit information.
Alternatively, when the channel is not trusted, public key verification can be performed in a more secure double encryption manner.
Specifically, the data storage system encrypts a random string str by using a public key of an inquiry user to obtain EN, encrypts the EN by using a private key of the data storage system to obtain EN2 (double encryption), decrypts EN2 by using the public key of the data storage system after the inquiry client receives EN2 to obtain EN3, decrypts EN3 by using the private key of the inquiry client to obtain str3, and sends back the string str3 to the data storage system, the data storage system verifies the received decrypted information (str3), and if the str is the same as the str3, the data storage system confirms that the inquiry client really has the exchanged public key (namely, the inquiry client passes the verification).
Optionally, the data storage system may encrypt the random string str with its own private key to obtain EN, encrypt the EN with the public key of the query client to obtain EN2 (double encryption), decrypt EN2 with its own private key after the query client receives EN2 to obtain EN3, decrypt EN3 with the public key of the data storage system to obtain str3, and send the string str3 back to the data storage system, where the data storage system verifies the received decrypted information (str3), and if str is the same as str3, the data storage system confirms that the query client has the exchanged public key (i.e., passes verification).
If the data deposit system confirms that the inquiry client side has the public key sent by the inquiry client side, the inquiry client side can retrieve all deposit information related to the public key in the data deposit system to obtain the required deposit information.
It should be noted that, in this application, generally, the first client to upload some evidence information is the initial generator of the information. The initial generator of the information sends the information to other participating authentication clients after successfully sending the authentication information to the data authentication system, so as to ensure that the first signature of the uploaded message in the authentication system is the initial generator of the information.
Meanwhile, in the application, the client can simultaneously initiate data storage to one or more data storage systems.
In the trusted data evidence storing method based on the block chain technology, a data evidence storing protocol and a block chain data evidence storing processing interface are realized through a block chain system (data evidence storing system), and data can be stored in the block chain evidence storing system, so that the data can be reserved as multi-party trusted data evidence.
The embodiment of the application also provides a trusted data storage system based on the block chain technology, which is characterized by comprising a receiving module, a signature verification module and a storage module; wherein the content of the first and second substances,
the receiving module is used for receiving the certificate storing request information sent by the client;
the signature verification module is used for verifying the certificate storage request information;
and the certificate storage module is used for storing the certificate of the certificate storage request information passing the verification.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the described system may refer to the corresponding process in the foregoing embodiment of the trusted data evidence storing method based on the block chain technology, and details are not described herein again.
An embodiment of the present application further provides an apparatus, including:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the above-described trusted data attestation method based on blockchain techniques.
In addition, an embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the above trusted data attestation method based on the block chain technology.
Reference is now made to fig. 3, which illustrates a schematic block diagram of a computer system suitable for implementing a terminal device or server of an embodiment of the present application. The terminal device shown in fig. 3 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 3, the computer system includes a Central Processing Unit (CPU)301 that can perform various appropriate actions and processes based on a program stored in a Read Only Memory (ROM)302 or a program loaded from a storage section 308 into a Random Access Memory (RAM) 303. In the RAM303, various programs and data necessary for system operation are also stored. The CPU301, ROM302, and RAM303 are connected to each other via a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
The following components are connected to the I/O interface 305: an input portion 306 including a keyboard, a mouse, and the like; an output section 307 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 308 including a hard disk and the like; and a communication section 309 including a network interface card such as a LAN card, a modem, or the like. The communication section 309 performs communication processing via a network such as the internet. The driver 310 is also connected to the I/O interface 305 on an as needed basis. A removable medium 311 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 310 on an as-needed basis, so that a computer program read out therefrom is mounted on the storage section 308 on an as-needed basis.
In particular, based on the embodiments of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 309, and/or installed from the removable medium 311. The computer program performs the above-described functions defined in the method of the present application when executed by the Central Processing Unit (CPU) 301.
It should be noted that the computer readable medium described herein can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a unit, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor includes an information measuring unit, a travel track determining unit, a mapping relation determining unit, and a driving strategy generating unit. Here, the names of these units do not constitute a limitation on the unit itself in some cases, and for example, the information measuring unit may also be described as a "unit that measures the state information of the own vehicle and the surrounding scene information".
As another aspect, the present application also provides a non-volatile computer storage medium, which may be the non-volatile computer storage medium included in the apparatus in the above-described embodiments; or it may be a non-volatile computer storage medium that exists separately and is not incorporated into the terminal. The non-transitory computer storage medium stores one or more programs that, when executed by a device, cause the device to: receiving certificate storage request information sent by a client; verifying the certificate storing request information; and if the verification is passed, storing the certificate storing request information through a block chain system.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the invention. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (10)

1. A credible data storage method based on a block chain technology is applied to a data storage system and is characterized by comprising the following steps:
receiving certificate storage request information sent by a client; the client is a client which completes public key exchange with the data storage system;
verifying the certificate storing request information;
and if the verification is passed, storing the certificate storing request information through a block chain system.
2. The method of claim 1, wherein the credential request message comprises:
information content and a signature for the information content;
the information content is encrypted data, including video, audio and/or text data.
3. The method of claim 2, wherein the public key exchange comprises:
when one client participating in the certificate storage is available, the client uploads signature information including a public key of the client and the public key to a data certificate storage system;
and the data certificate storing system receives the signature information which is sent by the client and comprises the self public key and the public key, and sends the self public key to the client to complete the public key exchange.
4. The method of claim 3, wherein the public key exchange comprises:
when the number of the clients participating in the certificate storage is N, the client initiating the certificate storage sends a certificate storage request to other clients participating in the certificate storage; n is a positive integer greater than 1;
the other clients participating in the certificate storage respond to the certificate storage request and send signature information comprising own public keys to the client initiating the certificate storage;
the client initiating the deposit certificate uploads the signature information including the public key and the public key of the client, the received public keys of other clients participating in the deposit certificate and the corresponding signature information, which are sent by the other clients participating in the deposit certificate, to a data deposit certificate system;
and the data certificate storage system receives the information and sends the public key to each client participating in certificate storage to complete public key exchange.
5. The method of claim 4, wherein the verifying the credential request information comprises:
and the data certificate storing system verifies the certificate storing request information through the public key of the client participating in certificate storing.
6. The method of claim 5, further comprising:
receiving a query request provided by a client;
the data deposit system sends a piece of information encrypted by the public key of the client to the client, the client decrypts the information by the private key of the client and sends the decrypted information to the data deposit system;
the data certification system verifies the received decrypted information, and if the verification is passed, the client can inquire the certified data.
7. The method of claim 6, further comprising:
receiving a query request provided by a client;
the data deposit system sends a piece of information encrypted by a public key of the client and a private key of the client to the client, the client decrypts the information by the private key of the client and the public key of the data deposit system and sends the decrypted information to the data deposit system;
the data certification system verifies the received decrypted information, and if the verification is passed, the client can inquire the certified data.
8. A credible data storage system based on a block chain technology is characterized by comprising a receiving module, a signature verification module and a storage module; wherein the content of the first and second substances,
the receiving module is used for receiving the certificate storing request information sent by the client;
the signature verification module is used for verifying the certificate storage request information;
and the certificate storage module is used for storing the certificate of the certificate storage request information passing the verification.
9. An apparatus, comprising:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out the method according to any one of claims 1 to 7.
CN202010634652.6A 2020-07-02 2020-07-02 Trusted data certification method based on blockchain technology Active CN111832046B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010634652.6A CN111832046B (en) 2020-07-02 2020-07-02 Trusted data certification method based on blockchain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010634652.6A CN111832046B (en) 2020-07-02 2020-07-02 Trusted data certification method based on blockchain technology

Publications (2)

Publication Number Publication Date
CN111832046A true CN111832046A (en) 2020-10-27
CN111832046B CN111832046B (en) 2024-02-23

Family

ID=72901036

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010634652.6A Active CN111832046B (en) 2020-07-02 2020-07-02 Trusted data certification method based on blockchain technology

Country Status (1)

Country Link
CN (1) CN111832046B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113541938A (en) * 2021-06-25 2021-10-22 国网山西省电力公司营销服务中心 Non-deception non-blocking channel-based calculation amount asymmetric evidence storing method

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108809932A (en) * 2018-04-09 2018-11-13 杭州拾贝知识产权服务有限公司 A kind of deposit system, method and readable medium based on block chain
CN109359691A (en) * 2018-10-24 2019-02-19 全链通有限公司 Auth method and system based on block chain
CN109740384A (en) * 2019-01-11 2019-05-10 众安信息技术服务有限公司 Data based on block chain deposit card method and apparatus
CN109741803A (en) * 2019-01-14 2019-05-10 南京大学 Medical data security cooperation system based on block chain
CN109871709A (en) * 2018-12-20 2019-06-11 顺丰科技有限公司 Block chain private data deposits card method, system and storage medium
CN110022298A (en) * 2019-03-04 2019-07-16 阿里巴巴集团控股有限公司 The method, apparatus of proof validation based on block chain, electronic equipment
US20190349199A1 (en) * 2018-05-10 2019-11-14 Alibaba Group Holding Limited Blockchain data processing methods, apparatuses, processing devices, and systems
CN110519062A (en) * 2019-09-19 2019-11-29 腾讯科技(深圳)有限公司 Identity identifying method, Verification System and storage medium based on block chain
WO2020007209A1 (en) * 2018-07-05 2020-01-09 腾讯科技(深圳)有限公司 Data storage method, apparatus and device, data verification method, apparatus and device, and medium
CN110795755A (en) * 2019-12-26 2020-02-14 深圳市建筑科学研究院股份有限公司 Building project scene type evidence storing and non-tampering method and system based on block chain
CN110990484A (en) * 2019-11-27 2020-04-10 深圳前海环融联易信息科技服务有限公司 Block chain based information storage method and system, computer equipment and storage medium
CN111027099A (en) * 2019-12-09 2020-04-17 北京海益同展信息科技有限公司 Identity verification method, device, system and computer readable storage medium
CN111062716A (en) * 2019-11-29 2020-04-24 支付宝(杭州)信息技术有限公司 Method and device for generating block chain signature data and block chain transaction initiating system
CN111130770A (en) * 2019-12-18 2020-05-08 杭州云萃流图网络科技有限公司 Block chain based information evidence storage method and system, user terminal, electronic equipment and storage medium

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108809932A (en) * 2018-04-09 2018-11-13 杭州拾贝知识产权服务有限公司 A kind of deposit system, method and readable medium based on block chain
US20190349199A1 (en) * 2018-05-10 2019-11-14 Alibaba Group Holding Limited Blockchain data processing methods, apparatuses, processing devices, and systems
WO2020007209A1 (en) * 2018-07-05 2020-01-09 腾讯科技(深圳)有限公司 Data storage method, apparatus and device, data verification method, apparatus and device, and medium
CN109359691A (en) * 2018-10-24 2019-02-19 全链通有限公司 Auth method and system based on block chain
CN109871709A (en) * 2018-12-20 2019-06-11 顺丰科技有限公司 Block chain private data deposits card method, system and storage medium
CN109740384A (en) * 2019-01-11 2019-05-10 众安信息技术服务有限公司 Data based on block chain deposit card method and apparatus
CN109741803A (en) * 2019-01-14 2019-05-10 南京大学 Medical data security cooperation system based on block chain
CN110022298A (en) * 2019-03-04 2019-07-16 阿里巴巴集团控股有限公司 The method, apparatus of proof validation based on block chain, electronic equipment
CN110519062A (en) * 2019-09-19 2019-11-29 腾讯科技(深圳)有限公司 Identity identifying method, Verification System and storage medium based on block chain
CN110990484A (en) * 2019-11-27 2020-04-10 深圳前海环融联易信息科技服务有限公司 Block chain based information storage method and system, computer equipment and storage medium
CN111062716A (en) * 2019-11-29 2020-04-24 支付宝(杭州)信息技术有限公司 Method and device for generating block chain signature data and block chain transaction initiating system
CN111027099A (en) * 2019-12-09 2020-04-17 北京海益同展信息科技有限公司 Identity verification method, device, system and computer readable storage medium
CN111130770A (en) * 2019-12-18 2020-05-08 杭州云萃流图网络科技有限公司 Block chain based information evidence storage method and system, user terminal, electronic equipment and storage medium
CN110795755A (en) * 2019-12-26 2020-02-14 深圳市建筑科学研究院股份有限公司 Building project scene type evidence storing and non-tampering method and system based on block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
DEEPA PAVITHRAN 等: "Towards Creating Public Key Authentication for loT Blockchain", 2019 SIXTH HCT INFORMATION TECHNOLOGY TRENDS(ITT), pages 110 - 114 *
张凡 等: "基于Borromean环签名的隐私数据认证方案", 密码学报, vol. 5, no. 05, pages 529 - 537 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113541938A (en) * 2021-06-25 2021-10-22 国网山西省电力公司营销服务中心 Non-deception non-blocking channel-based calculation amount asymmetric evidence storing method

Also Published As

Publication number Publication date
CN111832046B (en) 2024-02-23

Similar Documents

Publication Publication Date Title
US11799668B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
US10559049B2 (en) Digital passport country entry stamp
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN113162752B (en) Data processing method and device based on hybrid homomorphic encryption
CN110611657A (en) File stream processing method, device and system based on block chain
CN108923925B (en) Data storage method and device applied to block chain
CN113193961B (en) Digital certificate management method and device
CN112804217B (en) Block chain technology-based evidence storing method and device
CN111030827A (en) Information interaction method and device, electronic equipment and storage medium
CN115203749A (en) Data transaction method and system based on block chain
CN110737905B (en) Data authorization method, data authorization device and computer storage medium
CN111865761B (en) Social chat information evidence storing method based on block chain intelligent contracts
CN113206746B (en) Digital certificate management method and device
CN111181920A (en) Encryption and decryption method and device
CN114154181A (en) Privacy calculation method based on distributed storage
CN111832046B (en) Trusted data certification method based on blockchain technology
CN114499893B (en) Bidding file encryption and evidence storage method and system based on block chain
CN111010283A (en) Method and apparatus for generating information
CN110602075A (en) File stream processing method, device and system for encryption access control
CN113179169B (en) Digital certificate management method and device
CN115296807A (en) Key generation method, device and equipment for preventing industrial control network viruses
US11770260B1 (en) Determining authenticity of digital content
CN114826616B (en) Data processing method, device, electronic equipment and medium
CN114697022A (en) Encryption authentication method applied to power distribution network system
CN117544312A (en) Cross-domain digital signature method based on attribute encryption and related equipment thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant