CN111832046B - Trusted data certification method based on blockchain technology - Google Patents

Trusted data certification method based on blockchain technology Download PDF

Info

Publication number
CN111832046B
CN111832046B CN202010634652.6A CN202010634652A CN111832046B CN 111832046 B CN111832046 B CN 111832046B CN 202010634652 A CN202010634652 A CN 202010634652A CN 111832046 B CN111832046 B CN 111832046B
Authority
CN
China
Prior art keywords
client
public key
information
certification
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010634652.6A
Other languages
Chinese (zh)
Other versions
CN111832046A (en
Inventor
彭海杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongtong Uniform Chuangfa Science And Technology Co ltd
Original Assignee
Zhongtong Uniform Chuangfa Science And Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongtong Uniform Chuangfa Science And Technology Co ltd filed Critical Zhongtong Uniform Chuangfa Science And Technology Co ltd
Priority to CN202010634652.6A priority Critical patent/CN111832046B/en
Publication of CN111832046A publication Critical patent/CN111832046A/en
Application granted granted Critical
Publication of CN111832046B publication Critical patent/CN111832046B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

Embodiments of the present disclosure provide a trusted data attestation method, system, device, and computer-readable storage medium based on blockchain technology. The method comprises the steps of receiving certificate storing request information sent by a client; the client is a client which completes public key exchange with the data certification system; verifying the certificate storing request information; and if the verification is passed, the certification storing request information is subjected to certification storing through a block chain system. In this way, the data may be retained as a multiparty trusted data store.

Description

Trusted data certification method based on blockchain technology
Technical Field
Embodiments of the present disclosure relate generally to the field of data security technology and, more particularly, relate to a trusted data certification method, system, device, and computer readable storage medium based on blockchain technology.
Background
Blockchains are a term of art in information technology. Essentially, a blockchain system is a shared database in which data or information is stored, with features such as "non-counterfeitable", "global marking", "traceable", "public transparency", "collective maintenance". The block data has a time stamp thereon for marking the block generation time. The security of the user data depends on the public-private key hierarchy used. The blockchain technology provides a 'trust' basis, creates a reliable 'cooperation' mechanism, and has wide application prospect.
It can be seen that the reliability of data or information stored in a blockchain system is high.
With the popularity of computer and network technologies, electronic commerce and trade activities and many other network-based interpersonal interactions have emerged in large numbers, and electronic files (electronic data) have become important carriers for conveying information and recording facts. Once a dispute or case occurs in these respects, the associated electronic file becomes significant evidence.
However, the existing electronic evidence has the defects of easy extinction and easy tampering, is difficult to be accepted by notarization authorities, judicial authorities and the like, simultaneously, faults such as flaws, breakpoints, incomplete evidence and the like are easy to be caused in the transmission process, and the risks of data tampering are increased and the integrity is damaged in the processes of electronic data generation, solidification, evidence storage, storage and transfer and hand-over in the subsequent evidence use.
In summary, how to use blockchain to store and query electronic data is an urgent issue to be solved.
Disclosure of Invention
The present disclosure is directed to solving at least one of the technical problems existing in the prior art or related art.
To this end, in a first aspect of the present disclosure, a trusted data validation method based on blockchain technology is provided. The method comprises the following steps:
receiving certificate storing request information sent by a client; the client is a client which completes public key exchange with the data certification system;
verifying the certificate storing request information;
and if the verification is passed, the certification storing request information is subjected to certification storing through a block chain system.
Further, the certification request information includes:
information content and a signature for the information content;
wherein the information content is encrypted data, including video, audio and/or text data.
Further, the public key exchange includes:
when the client participating in the certification is one, the client uploads signature information comprising a public key of the client and the public key to a data certification system;
the data storage system receives signature information which is sent by the client and comprises a self public key and a public key, and sends the self public key to the client to finish public key exchange.
Further, the public key exchange includes:
when the number of the clients participating in the certificate deposit is N, the client initiating the certificate deposit sends a certificate deposit request to other clients participating in the certificate deposit; the N is a positive integer greater than 1;
the other clients participating in the certificate deposit respond to the certificate deposit request and send signature information comprising a public key of the other clients to the client initiating the certificate deposit;
the client side initiating the certificate deposit uploads the signature information comprising the public key and the public key thereof and the public keys and the corresponding signature information of other client sides comprising the certificate deposit sent by other client sides participating in the certificate deposit to a data certificate deposit system;
and the data certificate storage system receives the information and sends the public key to each client participating in certificate storage to complete public key exchange.
Further, the verifying the certification request information includes:
and the data certification system verifies the certification request information through the public key of the client participating in certification.
Further, the method further comprises the following steps:
receiving a query request proposed by a client;
the data certification system sends a piece of information encrypted by a public key of the client to the client, the client decrypts the information by using a private key of the client and sends the decrypted information to the data certification system;
and the data storage verification system verifies the received decrypted information, and if the verification is passed, the client can inquire the stored verification data.
Further, the method further comprises the following steps:
receiving a query request proposed by a client;
the data certification system sends a piece of information encrypted by the public key of the client and the private key of the client to the client, the client decrypts the information by the private key of the client and the public key of the data certification system, and sends the decrypted information to the data certification system;
and the data storage verification system verifies the received decrypted information, and if the verification is passed, the client can inquire the stored verification data.
In a second aspect of the present disclosure, a trusted data certification system based on a blockchain technique is provided, including a receiving module, a signature verification module, and a certification module; wherein,
the receiving module is used for receiving the certificate storing request information sent by the client;
the signature verification module is used for verifying the certification request information;
the certification module is used for certifying the certification request information which passes the verification.
In a third aspect of the present disclosure, an apparatus is presented comprising:
one or more processors;
a storage means for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the above-described methods as per the present disclosure.
In a fourth aspect of the present disclosure, a computer readable storage medium is provided, on which a computer program is stored, which program, when being executed by a processor, implements a method as described above according to the present disclosure.
The trusted data certification method based on the blockchain technology receives certification request information sent by a client; the client is a client which completes public key exchange with the data certification system; verifying the certificate storing request information; if the verification is passed, the verification request information is subjected to verification through a blockchain system, so that the information is reserved in the blockchain as the multiparty trusted data verification.
It should be understood that what is described in this summary is not intended to limit the critical or essential features of the embodiments of the disclosure nor to limit the scope of the disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The above and other features, advantages and aspects of embodiments of the present disclosure will become more apparent by reference to the following detailed description when taken in conjunction with the accompanying drawings. In the drawings, wherein like or similar reference numerals denote like or similar elements, in which:
FIG. 1 is an exemplary system architecture diagram in which an embodiment of the present application may be applied;
FIG. 2 is a flow chart of one embodiment of a trusted data validation method based on blockchain technology in accordance with the present application;
fig. 3 is a schematic structural diagram of a computer system for implementing a terminal device or a server according to an embodiment of the present application.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present disclosure more apparent, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present disclosure, and it is apparent that the described embodiments are some embodiments of the present disclosure, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments in this disclosure without inventive faculty, are intended to be within the scope of this disclosure.
In addition, the term "and/or" herein is merely an association relationship describing an association object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
It should be noted that, the blockchain referred to in this application may be any of a public chain, a federation chain, and a private chain.
FIG. 1 illustrates an exemplary system architecture 100 to which embodiments of the blockchain-based trusted data certification method or system of the present application may be applied.
As shown in fig. 1, a system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications, such as model training class applications, video recognition class applications, web browser applications, social platform software, etc., may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be hardware or software. When the terminal devices 101, 102, 103 are hardware, various electronic devices with display screens may be available, including but not limited to smartphones, tablet computers, e-book readers, MP3 players (movingpictureexpertsgroupadiayeriii, moving picture experts compression standard audio layer 3), MP4 (movingpictureexpertsgroupadiayeriv, moving picture experts compression standard audio layer 4) players, laptop and desktop computers, and the like. When the terminal devices 101, 102, 103 are software, they can be installed in the above-listed electronic devices. Which may be implemented as multiple software or software modules (e.g., multiple software or software modules for providing distributed services) or as a single software or software module. The present invention is not particularly limited herein.
When the terminals 101, 102, 103 are hardware, video capture devices may also be installed thereon. The video capturing device may be various devices capable of implementing a video capturing function, such as a camera, a sensor, and the like. The user may acquire video using a video acquisition device on the terminal 101, 102, 103.
The server 105 may be a server providing various services, such as a background server for processing data displayed on the terminal devices 101, 102, 103.
The server may be hardware or software. When the server is hardware, the server may be implemented as a distributed server cluster formed by a plurality of servers, or may be implemented as a single server. When the server is software, it may be implemented as a plurality of software or software modules (e.g., a plurality of software or software modules for providing distributed services), or as a single software or software module. The present invention is not particularly limited herein.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. In particular, in the case where the target data does not need to be acquired from a remote location, the above-described system architecture may not include a network but only include a terminal device or a server.
FIG. 2 is a flow chart of a trusted data certification method based on blockchain technology according to an embodiment of the present application. As can be seen from fig. 2, the trusted data certification method based on the blockchain technology of the present embodiment includes the following steps:
s210, receiving the certificate storing request information sent by the client.
In this embodiment, the execution body (e.g., the server shown in fig. 1) of the method for trusted data authentication may acquire the information sent by the client in a wired manner or in a wireless connection manner.
Further, the execution body may acquire information transmitted from an electronic device (for example, a terminal device shown in fig. 1) connected to the execution body in communication, or may be authentication information stored locally in advance.
Preferably, each user (client) and the smart contract on the data storage system each independently generates a key pair in advance. Each key pair consists of two parts, namely a public key KPub and a private key KPriv. Wherein the public key is public and does not need to be kept secret, and the private key is proprietary to the person (client) or the server and needs to be kept and paid attention to the confidentiality.
Optionally, the public key and the private key are paired for successful encryption and decryption in the public key hierarchy.
Alternatively, in this scheme, all information (electronic file) sent by the sender contains a signature, and the receiver only processes the information that passes the signature verification.
Optionally, the signature includes:
a sends information to B, A calculates the information abstract of the information, then encrypts the information abstract by using the private key of the A, and the encrypted information abstract is a signature. That is, a encrypts the message digest with its own private key. All transmitted information in this application is signed using the method described above. That is, all information (electronic files) sent by the sender in this scheme contains a signature.
And B, after receiving the information, extracting the information abstract by using the same method as A, decrypting the signature by using the public key of A, comparing the signature with the information abstract calculated by the user, and if the information abstract is the same, transmitting the information to B by the A. At the same time, a cannot deny the fact that it sends information to B itself. That is, the process of B decrypting the signature using the public key of A and comparing whether the digests are consistent is called "signature verification". In the application, the receiver only processes the information passing the signature verification.
Further, the key may be generated using public key mechanisms such as RSA, DSA, elliptic curve, etc.
Optionally, the keys in the public key mechanism include a public key and a private key.
Preferably, the clients in the scheme are all clients which complete public key exchange with the data certification system.
Optionally, when the client participating in the certification is one, the public key exchange includes:
the client uploads signature information comprising a public key and the public key to a data storage certificate system (intelligent contract), and the data storage certificate system receives the signature information comprising the public key and the public key sent by the client and sends the public key to the client to complete public key exchange.
Optionally, when the number of clients participating in the certification is N, the public key exchange includes:
wherein N is a positive integer greater than 1;
the client initiating the deposit certificate sends a deposit certificate request to other clients participating in the deposit certificate, the other clients participating in the deposit certificate respond to the deposit certificate request and send signature information comprising a public key of the client initiating the deposit certificate to the client initiating the deposit certificate, the client initiating the deposit certificate uploads the signature information comprising the public key of the client initiating the deposit certificate and the public key and the received public key and corresponding signature information of the other clients participating in the deposit certificate sent by the other clients participating in the deposit certificate to a data deposit certificate system (intelligent contract), and the data deposit certificate system receives the information and sends the public key of the client initiating the deposit certificate to each client participating in the deposit certificate to finish public key exchange.
Optionally, the client terminal completing the public key exchange calls the intelligent contract on the data certification system to initiate certification request information.
Further, the certification request information includes:
information content and a signature for the information content;
the information content is encrypted data, and the encrypted data comprises various forms of data such as video, audio and/or text.
S220, verifying the certificate storing request information, and if the verification is passed, storing the certificate storing request information through a block chain system.
Optionally, the data signing system (smart contract) signs the received signature of the signing request information through the public key of the signing client, so as to determine whether the information is sent by the signing user.
Specifically, public keys of all the participating certificate-storing clients are stored in the data certificate-storing system (intelligent contract), and when the data certificate-storing system receives the certificate-storing request information, the stored public keys of the participating certificate-storing clients are used for verifying the certificate-storing request information to detect whether all users participating in the certificate-storing submit signatures to the certificate-storing request information.
When the intelligent contract detects that all users participating in the certification submit signatures to the information, namely after signature verification passes, the intelligent contract stores signature information of the client to the information into a block of the data system.
Further, the method further comprises the following steps:
and inquiring the stored information.
Optionally, the query client accesses the data certification system through the WEB browser for HTTPS, and simultaneously sends a certification information query request to the data certification system, and the data certification system exchanges public keys with the query client after receiving the certification information query request.
After the public key exchange is completed, the data storage verification system encrypts a random character string (str) by using the public key of the inquiring client to form a ciphertext (EN), the ciphertext is sent to the inquiring client, the inquiring client decrypts the EN by using the private key of the inquiring client to obtain a data character string str2, the character string str2 is returned to the data storage verification system, the data storage verification system verifies the received decrypted information (str 2), and if str is the same as str2, the data storage verification system confirms that the inquiring client has the exchanged public key (namely verification is passed).
If the data certification system confirms that the inquiring client has the public key sent by the inquiring client, the inquiring client can search all certification information associated with the public key in the data certification system to obtain the required certification information.
Alternatively, when the channel is not trusted, public key verification may be performed in a more secure double encryption manner.
Specifically, the data storage certification system firstly encrypts the random character string str by using the public key of the inquiring user to obtain EN, then encrypts EN by using the private key of the data storage certification system to obtain EN2 (double encryption), after the inquiring client receives EN2, firstly decrypts EN2 by using the public key of the data storage certification system to obtain EN3, then decrypts EN3 by using the private key of the inquiring client to obtain str3, and returns the character string str3 to the data storage certification system, the data storage certification system verifies the received decrypted information (str 3), and if str is the same as str3, the data storage certification system confirms that the inquiring client really has the exchanged public key (namely verification is passed).
Optionally, the data storage verification system may encrypt the random string str with its own private key to obtain EN, encrypt EN with the public key of the querying client to obtain EN2 (double encryption), decrypt EN2 with its own private key to obtain EN3 after the querying client receives EN2, decrypt EN3 with the public key of the data storage verification system to obtain str3, and send the string str3 back to the data storage verification system, where the data storage verification system verifies the received decrypted information (str 3), and if str is the same as str3, the data storage verification system confirms that the querying client has its exchanged public key (i.e. verification is passed).
If the data certification system confirms that the inquiring client has the public key sent by the inquiring client, the inquiring client can search all certification information associated with the public key in the data certification system to obtain the required certification information.
It should be noted that, in this application, the first client to upload a certain certificate information is usually the initial producer of the information. The initial generator of the information sends the certification information to other certification participating clients after the certification information is successfully sent to the data certification system, so as to ensure that the first uploading message in the certification system signs the initial generator of the information.
Meanwhile, in the application, the client may initiate data certification to one or more data certification systems at the same time.
The trusted data storage and verification method based on the blockchain technology realizes a data storage and verification protocol and a blockchain data storage and verification processing interface through a blockchain system (data storage and verification system), and can store data in the blockchain storage and verification system, so that the data can be reserved as a multiparty trusted data storage and verification.
The embodiment of the application also provides a trusted data certification system based on the blockchain technology, which is characterized by comprising a receiving module, a signature verification module and a certification module; wherein,
the receiving module is used for receiving the certificate storing request information sent by the client;
the signature verification module is used for verifying the certification request information;
the certification module is used for certifying the certification request information which passes the verification.
It will be clear to those skilled in the art that, for convenience and brevity of description, a specific working process of the described system may refer to a corresponding process in the foregoing embodiment of a trusted data storage method based on a blockchain technology, which is not described herein again.
The embodiment of the application also provides equipment, which comprises:
one or more processors;
a storage means for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the trusted data validation method based on blockchain technology described above.
In addition, the embodiment of the application also provides a computer readable storage medium, and a computer program is stored on the computer readable storage medium, and the program is executed by a processor to realize the trusted data certification method based on the blockchain technology.
Reference is now made to fig. 3, which is a schematic diagram illustrating a computer system suitable for use in implementing the terminal device or server of an embodiment of the present application. The terminal device shown in fig. 3 is only an example, and should not impose any limitation on the functions and the scope of use of the embodiments of the present application.
As shown in fig. 3, the computer system includes a Central Processing Unit (CPU) 301 that can perform various appropriate actions and processes based on a program stored in a Read Only Memory (ROM) 302 or a program loaded from a storage section 308 into a Random Access Memory (RAM) 303. In the RAM303, various programs and data required for the system operation are also stored. The CPU301, ROM302, and RAM303 are connected to each other through a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
The following components are connected to the I/O interface 305: an input section 306 including a keyboard, a mouse, and the like; an output portion 307 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 308 including a hard disk or the like; and a communication section 309 including a network interface card such as a LAN card, a modem, or the like. The communication section 309 performs communication processing via a network such as the internet. The drive 310 is also connected to the I/O interface 305 on an as-needed basis. Removable media 311, such as magnetic disks, optical disks, magneto-optical disks, semiconductor memories, and the like, are installed on demand on drive 310 so that a computer program read therefrom is installed into storage section 308 on demand.
In particular, the processes described above with reference to flowcharts may be implemented as computer software programs, based on embodiments of the present disclosure. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 309, and/or installed from the removable medium 311. The above-described functions defined in the method of the present application are performed when the computer program is executed by a Central Processing Unit (CPU) 301.
It should be noted that, the computer readable medium described in the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the above. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a unit, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present application may be implemented by software, or may be implemented by hardware. The described units may also be provided in a processor, for example, described as: a processor includes an information measurement unit, a travel locus determination unit, a map determination unit, and a driving strategy generation unit. The names of these units do not constitute limitations on the unit itself in some cases, and for example, the information measurement unit may also be described as "a unit that measures state information of the host vehicle and surrounding scene information".
As another aspect, the present application also provides a nonvolatile computer storage medium, which may be a nonvolatile computer storage medium included in the apparatus described in the above embodiment; or may be a non-volatile computer storage medium, alone, that is not incorporated into the terminal. The above-described nonvolatile computer storage medium stores one or more programs that, when executed by an apparatus, cause the apparatus to: receiving certificate storing request information sent by a client; verifying the certificate storing request information; and if the verification is passed, the certification storing request information is subjected to certification storing through a block chain system.
The foregoing description is only of the preferred embodiments of the present application and is presented as a description of the principles of the technology being utilized. It will be appreciated by persons skilled in the art that the scope of the invention referred to in this application is not limited to the specific combinations of features described above, but it is intended to cover other embodiments in which any combination of features described above or equivalents thereof is possible without departing from the spirit of the invention. Such as the above-described features and technical features having similar functions (but not limited to) disclosed in the present application are replaced with each other.

Claims (9)

1. The trusted data certification method based on the blockchain technology is applied to a data certification system and is characterized by comprising the following steps of:
receiving certificate storing request information sent by a client; the client is a client which completes public key exchange with the data certification system; the public key exchange includes:
when the number of the clients participating in the certificate deposit is N, the client initiating the certificate deposit sends a certificate deposit request to other clients participating in the certificate deposit; the N is a positive integer greater than 1;
the other clients participating in the certificate deposit respond to the certificate deposit request and send signature information comprising a public key of the other clients to the client initiating the certificate deposit;
the client side initiating the certificate deposit uploads the signature information comprising the public key and the public key thereof and the public keys and the corresponding signature information of other client sides comprising the certificate deposit sent by other client sides participating in the certificate deposit to a data certificate deposit system;
the data certification system receives the information and sends the public key to each client participating in certification to complete public key exchange;
verifying the certificate storing request information;
and if the verification is passed, the certification storing request information is subjected to certification storing through a block chain system.
2. The method of claim 1, wherein the certification request message comprises:
information content and a signature for the information content;
wherein the information content is encrypted data, including video, audio and/or text data.
3. The method of claim 2, wherein the public key exchange comprises:
when the client participating in the certification is one, the client uploads signature information comprising a public key of the client and the public key to a data certification system;
the data storage system receives signature information which is sent by the client and comprises a self public key and a public key, and sends the self public key to the client to finish public key exchange.
4. The method of claim 1, wherein verifying the certification request information comprises:
and the data certification system verifies the certification request information through the public key of the client participating in certification.
5. The method as recited in claim 4, further comprising:
receiving a query request proposed by a client;
the data certification system sends a piece of information encrypted by a public key of the client to the client, the client decrypts the information by using a private key of the client and sends the decrypted information to the data certification system;
and the data storage system verifies the received decrypted information, and if the verification is passed, the client inquires the stored data.
6. The method as recited in claim 5, further comprising:
receiving a query request proposed by a client;
the data certification system sends a piece of information encrypted by the public key of the client and the private key of the client to the client, the client decrypts the information by the private key of the client and the public key of the data certification system, and sends the decrypted information to the data certification system;
and the data storage verification system verifies the received decrypted information, and if the verification is passed, the client side inquires the stored verification data.
7. The trusted data certification system based on the blockchain technology is characterized by comprising a receiving module, a signature verification module and a certification storage module; wherein,
the receiving module is used for receiving the certificate storing request information sent by the client, and the client is a client which completes public key exchange with the data certificate storing system; the public key exchange includes:
when the number of the clients participating in the certificate deposit is N, the client initiating the certificate deposit sends a certificate deposit request to other clients participating in the certificate deposit; the N is a positive integer greater than 1;
the other clients participating in the certificate deposit respond to the certificate deposit request and send signature information comprising a public key of the other clients to the client initiating the certificate deposit;
the client side initiating the certificate deposit uploads the signature information comprising the public key and the public key thereof and the public keys and the corresponding signature information of other client sides comprising the certificate deposit sent by other client sides participating in the certificate deposit to a data certificate deposit system;
the data certification system receives the information and sends the public key to each client participating in certification to complete public key exchange; the signature verification module is used for verifying the certification request information;
the certification module is used for certifying the certification request information which passes the verification.
8. An electronic device, comprising:
one or more processors;
a storage means for storing one or more programs;
when executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1-6.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method according to any one of claims 1-6.
CN202010634652.6A 2020-07-02 2020-07-02 Trusted data certification method based on blockchain technology Active CN111832046B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010634652.6A CN111832046B (en) 2020-07-02 2020-07-02 Trusted data certification method based on blockchain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010634652.6A CN111832046B (en) 2020-07-02 2020-07-02 Trusted data certification method based on blockchain technology

Publications (2)

Publication Number Publication Date
CN111832046A CN111832046A (en) 2020-10-27
CN111832046B true CN111832046B (en) 2024-02-23

Family

ID=72901036

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010634652.6A Active CN111832046B (en) 2020-07-02 2020-07-02 Trusted data certification method based on blockchain technology

Country Status (1)

Country Link
CN (1) CN111832046B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113541938A (en) * 2021-06-25 2021-10-22 国网山西省电力公司营销服务中心 Non-deception non-blocking channel-based calculation amount asymmetric evidence storing method

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108809932A (en) * 2018-04-09 2018-11-13 杭州拾贝知识产权服务有限公司 A kind of deposit system, method and readable medium based on block chain
CN109359691A (en) * 2018-10-24 2019-02-19 全链通有限公司 Auth method and system based on block chain
CN109741803A (en) * 2019-01-14 2019-05-10 南京大学 Medical data security cooperation system based on block chain
CN109740384A (en) * 2019-01-11 2019-05-10 众安信息技术服务有限公司 Data based on block chain deposit card method and apparatus
CN109871709A (en) * 2018-12-20 2019-06-11 顺丰科技有限公司 Block chain private data deposits card method, system and storage medium
CN110022298A (en) * 2019-03-04 2019-07-16 阿里巴巴集团控股有限公司 The method, apparatus of proof validation based on block chain, electronic equipment
CN110519062A (en) * 2019-09-19 2019-11-29 腾讯科技(深圳)有限公司 Identity identifying method, Verification System and storage medium based on block chain
WO2020007209A1 (en) * 2018-07-05 2020-01-09 腾讯科技(深圳)有限公司 Data storage method, apparatus and device, data verification method, apparatus and device, and medium
CN110795755A (en) * 2019-12-26 2020-02-14 深圳市建筑科学研究院股份有限公司 Building project scene type evidence storing and non-tampering method and system based on block chain
CN110990484A (en) * 2019-11-27 2020-04-10 深圳前海环融联易信息科技服务有限公司 Block chain based information storage method and system, computer equipment and storage medium
CN111027099A (en) * 2019-12-09 2020-04-17 北京海益同展信息科技有限公司 Identity verification method, device, system and computer readable storage medium
CN111062716A (en) * 2019-11-29 2020-04-24 支付宝(杭州)信息技术有限公司 Method and device for generating block chain signature data and block chain transaction initiating system
CN111130770A (en) * 2019-12-18 2020-05-08 杭州云萃流图网络科技有限公司 Block chain based information evidence storage method and system, user terminal, electronic equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108600272B (en) * 2018-05-10 2020-08-04 阿里巴巴集团控股有限公司 Block chain data processing method, device, processing equipment and system

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108809932A (en) * 2018-04-09 2018-11-13 杭州拾贝知识产权服务有限公司 A kind of deposit system, method and readable medium based on block chain
WO2020007209A1 (en) * 2018-07-05 2020-01-09 腾讯科技(深圳)有限公司 Data storage method, apparatus and device, data verification method, apparatus and device, and medium
CN109359691A (en) * 2018-10-24 2019-02-19 全链通有限公司 Auth method and system based on block chain
CN109871709A (en) * 2018-12-20 2019-06-11 顺丰科技有限公司 Block chain private data deposits card method, system and storage medium
CN109740384A (en) * 2019-01-11 2019-05-10 众安信息技术服务有限公司 Data based on block chain deposit card method and apparatus
CN109741803A (en) * 2019-01-14 2019-05-10 南京大学 Medical data security cooperation system based on block chain
CN110022298A (en) * 2019-03-04 2019-07-16 阿里巴巴集团控股有限公司 The method, apparatus of proof validation based on block chain, electronic equipment
CN110519062A (en) * 2019-09-19 2019-11-29 腾讯科技(深圳)有限公司 Identity identifying method, Verification System and storage medium based on block chain
CN110990484A (en) * 2019-11-27 2020-04-10 深圳前海环融联易信息科技服务有限公司 Block chain based information storage method and system, computer equipment and storage medium
CN111062716A (en) * 2019-11-29 2020-04-24 支付宝(杭州)信息技术有限公司 Method and device for generating block chain signature data and block chain transaction initiating system
CN111027099A (en) * 2019-12-09 2020-04-17 北京海益同展信息科技有限公司 Identity verification method, device, system and computer readable storage medium
CN111130770A (en) * 2019-12-18 2020-05-08 杭州云萃流图网络科技有限公司 Block chain based information evidence storage method and system, user terminal, electronic equipment and storage medium
CN110795755A (en) * 2019-12-26 2020-02-14 深圳市建筑科学研究院股份有限公司 Building project scene type evidence storing and non-tampering method and system based on block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Towards Creating Public Key Authentication for loT Blockchain;Deepa Pavithran 等;2019 Sixth HCT Information Technology Trends(ITT);110-114 *
基于Borromean环签名的隐私数据认证方案;张凡 等;密码学报;第5卷(第05期);529-537 *

Also Published As

Publication number Publication date
CN111832046A (en) 2020-10-27

Similar Documents

Publication Publication Date Title
US11799668B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN110798315B (en) Data processing method and device based on block chain and terminal
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN113162752B (en) Data processing method and device based on hybrid homomorphic encryption
CN111464295B (en) Bank card making method and device
CN110611657A (en) File stream processing method, device and system based on block chain
CN113193961B (en) Digital certificate management method and device
CN109413116A (en) A kind of believable cloud identity identifying method and system
CN115296807B (en) Key generation method, device and equipment for preventing industrial control network viruses
CN113315745A (en) Data processing method, device, equipment and medium
CN103780617A (en) Method and device for processing video conference data
CN115203749A (en) Data transaction method and system based on block chain
CN114780923A (en) Electronic seal management and control method and system
CN110737905B (en) Data authorization method, data authorization device and computer storage medium
CN111865761B (en) Social chat information evidence storing method based on block chain intelligent contracts
CN113595742B (en) Data transmission method, system, computer device and storage medium
CN113206746B (en) Digital certificate management method and device
CN114154181A (en) Privacy calculation method based on distributed storage
CN111832046B (en) Trusted data certification method based on blockchain technology
CN118114222A (en) Authentication method, device, system, equipment and medium for data product
KR102355918B1 (en) Method for providing electoric data using block-chain and system thereof
CN113328854A (en) Service processing method and system based on block chain
CN111010283B (en) Method and apparatus for generating information
US11770260B1 (en) Determining authenticity of digital content
CN114499893B (en) Bidding file encryption and evidence storage method and system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant