CN112153039B - Data storage certificate sharing method based on block chain - Google Patents

Data storage certificate sharing method based on block chain Download PDF

Info

Publication number
CN112153039B
CN112153039B CN202010994302.0A CN202010994302A CN112153039B CN 112153039 B CN112153039 B CN 112153039B CN 202010994302 A CN202010994302 A CN 202010994302A CN 112153039 B CN112153039 B CN 112153039B
Authority
CN
China
Prior art keywords
evidence
data
user
storage
txid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010994302.0A
Other languages
Chinese (zh)
Other versions
CN112153039A (en
Inventor
李亚荣
姜孟杉
白健
安红章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electronic Technology Cyber Security Co Ltd
Original Assignee
China Electronic Technology Cyber Security Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Electronic Technology Cyber Security Co Ltd filed Critical China Electronic Technology Cyber Security Co Ltd
Priority to CN202010994302.0A priority Critical patent/CN112153039B/en
Publication of CN112153039A publication Critical patent/CN112153039A/en
Application granted granted Critical
Publication of CN112153039B publication Critical patent/CN112153039B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention discloses a data evidence sharing method based on a block chain. The invention provides a safe and reliable data encryption storage scheme for users based on the block chain technology, the users share the evidence data to other users in a linked mode, and the other users can obtain the evidence data at any time; the invention records the data hash on the block chain, and provides the trustable integrity check for the data storage certificate; the invention stores the data of the deposit certificate in an encrypted way, the encryption key is derived from the private key of the user and the transaction ID, and the deposit certificate center provides a reliable storage mode to realize the safe storage of the data; according to the method and the device, the evidence storage data is shared in the form of the evidence storage mapping address, the evidence storage data is shared to the appointed user and is shared offline, and the user experience is improved.

Description

Data storage certificate sharing method based on block chain
Technical Field
The invention relates to the technical field of block chains, in particular to a data evidence sharing method based on a block chain.
Background
The existing data storage system has the following risks:
(1) the data lacks public confirmation. Data release is submitted by a resource party independently, and the system lacks uniqueness authentication and time sequence notarization registration for the data, so that the problems of repeated registration of the data and the like may exist.
(2) The data management and control responsibility is too centralized. Data access authorization, sharing exchange and the like are all completed on an information storage and verification sharing platform, so that a resource provider and a demander are required to fully trust the platform, and problems often exist in practical application.
One of the core characteristics of the blockchain technology is non-tamper-able, so that blockchain data storage is a main mode for future data storage, and most of the current blockchain-based data storage solutions have the problems of complex operation process, high difficulty, user experience unfriendliness and the like.
Disclosure of Invention
Aiming at the defects in the prior art, the data evidence sharing method based on the block chain solves the problems of complex operation process, high difficulty and unfriendly user experience of most of the existing data evidence sharing solutions based on the block chain.
In order to achieve the purpose of the invention, the invention adopts the technical scheme that: a data evidence sharing method based on a block chain comprises the following steps:
s1, recording the hash value of the certificate storage data on a block chain, and returning a transaction number corresponding to the hash value to the user through the block chain;
s2, deriving a symmetric encryption key according to the private key of the user and the transaction number to encrypt the certificate-storing data, storing the user name, the transaction number, the file name of the encrypted data and the encrypted data in a certificate-storing center, and updating an evidence list of the user;
s3, requesting a evidence storage list from the evidence storage center, selecting a transaction number, a file name and an evidence storage mapping address corresponding to the target data, sending the transaction number, the file name and the evidence storage mapping address to an evidence acquirer, initiating an evidence acquisition request to the evidence storage center through the evidence acquirer, downloading the encrypted data, locally decrypting the encrypted data to acquire evidence storage data, and completing data evidence storage sharing.
Further: the specific steps of step S1 are:
s11, calculating a hash value H of the evidence according to the evidence storage data;
s12, initiating an evidence hash uplink request by a user to obtain chaining data, wherein the chaining data comprises an identity identifier appID of the user, a hash value H of the evidence and a signature of the user to the appID and H;
s13, verifying the signature through the block chain, chaining the hash value H of the evidence, and generating a transaction number TxID;
and S14, returning the chain-recording result and the transaction number TxID to the user through the block chain.
Further: the hash value H in step S11 is calculated by the following formula:
H=hash(ED)
in the above formula, hash is a hash function, and ED is evidence storage data.
Further: the specific steps of step S2 are:
s21, deriving a data encryption key according to the user private key sk and the transaction number;
s22, generating encrypted certificate storing data C according to the certificate storing data and the encryption key, wherein the calculation formula is as follows: c ═ E (ed), where E is a symmetric encryption algorithm;
s23, sending the identity identifier appID, the transaction number TxID, the file name fileName of the card storage data and the encrypted card storage data C of the user to a card storage center;
s24, generating an evidence storage mapping address L according to the encrypted evidence storage data C of the evidence storage center;
s25, generating evidence storage mapping address L according to new datai
S26, updating the user evidence list, adding new data into the user evidence list appIDlist, and calculating the formula as appIDlist ═ appID, TxIDi,fileNamei,Li} U { appID, TxID, fileName, L }, where TxIDiNumbering new transactions, fileNameiThe file name of the certificate storing data of the new data;
and S27, returning the user evidence list appIDlist to the user through the evidence storage center.
Further: the calculation formula of the encryption key in step S21 is:
key=hash(sk||TxID)
in the above formula, the hash is a hash function.
Further: the specific steps of step S3 are:
s31, sending an { EDlistGetReq, appID } request list to a license storage center through a user, wherein the EDlistGetReq is a list request identifier;
s32, returning an evidence list appIDlist corresponding to the identity identifier appID to the user through the evidence storage center;
s33, selecting target evidence fileName in the evidence listi
S34, sending { EDGetReq, appID, TxID through useri,fileNamei,LiInitiating an evidence obtaining request, wherein EDGetReq is an evidence obtaining request identifier;
s35, inquiring the evidence obtaining request and returning the encrypted evidence storing data C in the evidence storing center;
s36, calculating a decryption key1 by the user;
s37, decrypting the encrypted evidence data C by the user according to the decryption key1 to obtain evidence ED 1;
s38, selecting target evidence in the evidence list by the user, and encrypting the decryption key1 by the public key pk of the evidence acquirer to obtain Epk(key1), Epk(key1) and information of target evidence { TxIDi,fileNamei,LiSending the data to an evidence acquirer;
s39, sending { EDGetReq, appID, TxID through evidence acquireri,fileNamei,LiInitiating an evidence acquisition request;
s310, inquiring the evidence obtaining request and returning the encrypted evidence storing data C in the evidence storing center;
s311, decrypting the key2 by the evidence acquirer;
s312, the evidence acquirer decrypts the encrypted evidence storage data C according to the decryption key2 to acquire evidence ED 2.
Further: the calculation formula of the decryption key1 is as follows:
key1=hash(sk||TxIDi)
the formula for the evidence ED1 is:
ED1=Dkey1(C)
the calculation formula of the decryption key2 is as follows:
key2=Dsk(Epk(key1))
the formula for the evidence ED2 is:
ED=Dkey2(C)。
the invention has the beneficial effects that: the invention provides a safe and reliable data encryption storage scheme for users based on the block chain technology, the users share the evidence data to other users in a linked mode, and other users can obtain the evidence data at any time. The method has the following specific beneficial effects:
(1) the invention records the data hash on the block chain, and provides the trustable integrity check for the data storage certificate;
(2) the invention stores the data of the deposit certificate in an encrypted way, the encryption key is derived from the private key of the user and the transaction ID, and the deposit certificate center provides a reliable storage mode to realize the safe storage of the data;
(3) according to the method and the device, the evidence storage data is shared in the form of the evidence storage mapping address, the evidence storage data is shared to the appointed user and is shared offline, and the user experience is improved.
Drawings
FIG. 1 is a flow chart of the present invention;
fig. 2 is a working principle diagram of the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate the understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and it will be apparent to those skilled in the art that various changes may be made without departing from the spirit and scope of the invention as defined and defined in the appended claims, and all matters produced by the invention using the inventive concept are protected.
The signature algorithm used in the invention is SM2 signature algorithm (GM/T0003), the encryption algorithms used are SM2 encryption algorithm (GM/T0003) and SM4 symmetric encryption algorithm (GM/T0002), and the hash algorithm used is SM3 hash algorithm (GM/T0004).
As shown in fig. 1 and fig. 2 together, a block chain-based data evidence sharing method includes three parts, namely evidence chaining, evidence storage and evidence sharing. The method comprises the following steps:
s1, recording the hash value of the certificate storage data on a block chain, and returning a transaction number corresponding to the hash value to the user through the block chain; the method comprises the following specific steps:
s11, calculating a hash value H of the evidence according to the evidence storage data; the hash value H is calculated as:
H=hash(ED)
in the above formula, hash is a hash function, and ED is evidence storage data.
S12, initiating an evidence hash uplink request by a user to obtain chaining data, wherein the chaining data comprises an identity identifier appID of the user, a hash value H of the evidence and a signature of the user to the appID and H;
s13, verifying the signature through the block chain, chaining the hash value H of the evidence, and generating a transaction number TxID;
and S14, returning the chain-recording result and the transaction number TxID to the user through the block chain.
S2, deriving a symmetric encryption key according to the private key of the user and the transaction number to encrypt the certificate-storing data, storing the user name, the transaction number, the file name of the encrypted data and the encrypted data in a certificate-storing center, and updating an evidence list of the user; the method comprises the following specific steps:
s21, deriving a data encryption key according to the user private key sk and the transaction number; the calculation formula of the encryption key is as follows:
key=hash(sk||TxID)
in the above formula, the hash is a hash function.
S22, generating encrypted certificate storing data C according to the certificate storing data and the encryption key, wherein the calculation formula is as follows: c ═ E (ed), where E is a symmetric encryption algorithm;
s23, sending the identity identifier appID, the transaction number TxID, the file name fileName of the card storage data and the encrypted card storage data C of the user to a card storage center;
s24, generating an evidence storage mapping address L according to the encrypted evidence storage data C of the evidence storage center;
s25, generating evidence storage mapping address L according to new datai
S26, updating the user evidence list, adding new data into the user evidence list appIDlist, and calculating the formula as appIDlist ═ appID, TxIDi,fileNamei,Li} U { appID, TxID, fileName, L }, which isMiddle TxIDiNumbering new transactions, fileNameiThe file name of the certificate storing data of the new data;
and S27, returning the user evidence list appIDlist to the user through the evidence storage center.
S3, requesting a evidence storage list from the evidence storage center, selecting a transaction number, a file name and an evidence storage mapping address corresponding to the target data, sending the transaction number, the file name and the evidence storage mapping address to an evidence acquirer, initiating an evidence acquisition request to the evidence storage center through the evidence acquirer, downloading the encrypted data, locally decrypting the encrypted data to acquire evidence storage data, and completing data evidence storage sharing. The method comprises the following specific steps:
s31, sending an { EDlistGetReq, appID } request list to a license storage center through a user, wherein the EDlistGetReq is a list request identifier;
s32, returning an evidence list appIDlist corresponding to the identity identifier appID to the user through the evidence storage center;
s33, selecting target evidence fileName in the evidence listi
S34, sending { EDGetReq, appID, TxID through useri,fileNamei,LiInitiating an evidence obtaining request, wherein EDGetReq is an evidence obtaining request identifier;
s35, inquiring the evidence obtaining request and returning the encrypted evidence storing data C in the evidence storing center;
s36, calculating a decryption key1 by the user; the calculation formula of the decryption key1 is:
key1=hash(sk||TxIDi)
s37, decrypting the encrypted evidence data C by the user according to the decryption key1 to obtain evidence ED 1; the formula for the calculation of evidence ED1 is:
ED1=Dkey1(C)
s38, selecting target evidence in the evidence list by the user, and encrypting the decryption key1 by the public key pk of the evidence acquirer to obtain Epk(key1), Epk(key1) and information of target evidence { TxIDi,fileNamei,LiSending the data to an evidence acquirer;
s39, sending { EDGetReq, appID, TxI through evidence acquirerDi,fileNamei,LiInitiating an evidence acquisition request;
s310, inquiring the evidence obtaining request and returning the encrypted evidence storing data C in the evidence storing center;
s311, decrypting the key2 by the evidence acquirer; the calculation formula of the decryption key2 is:
key2=Dsk(Epk(key1))
s312, the evidence acquirer decrypts the encrypted evidence storage data C according to the decryption key2 to acquire evidence ED 2. The formula for the calculation of evidence ED2 is:
ED=Dkey2(C)
the invention provides a safe and reliable data encryption storage scheme for users based on the block chain technology, the users share the evidence data to other users in a linked mode, and other users can obtain the evidence data at any time.

Claims (6)

1. A data evidence sharing method based on a block chain is characterized by comprising the following steps:
s1, recording the hash value of the certificate storage data on a block chain, and returning a transaction number corresponding to the hash value to the user through the block chain;
s2, deriving a symmetric encryption key according to the private key and the transaction number of the user to encrypt the certificate storing data, storing the identity identifier, the transaction number, the certificate storing data file name and the encrypted certificate storing data of the user in a certificate storing center, and updating an evidence list of the user;
the specific steps of step S2 are:
s21, deriving a data encryption key according to the user private key sk and the transaction number;
s22, generating encrypted certificate storing data C according to the certificate storing data and the encryption key, wherein the calculation formula is as follows: c ═ E (ed), where E is a symmetric encryption algorithm;
s23, sending the identity identifier appID, the transaction number TxID, the certificate storage data fileName and the encrypted certificate storage data C of the user to a certificate storage center;
s24, generating an evidence storage mapping address L according to the encrypted evidence storage data C of the evidence storage center;
s25, generating evidence storage mapping address L according to new datai
S26, updating the evidence list, adding new data into the evidence list appIDlist, and calculating the formula as appIDlist ═ appID, TxIDi,fileNamei,Li} U { appID, TxID, fileName, L }, where TxIDiNumbering new transactions, fileNameiThe file name of the certificate storing data of the new data;
s27, returning an evidence list appIDlist to the user through the evidence storage center;
s3, requesting an evidence list from the evidence storage center, selecting a transaction number, a file name of evidence storage data and an evidence storage mapping address corresponding to target data, sending the transaction number, the file name of evidence storage data and the evidence storage mapping address to an evidence acquirer, initiating an evidence acquisition request to the evidence storage center through the evidence acquirer, downloading encrypted evidence storage data, locally decrypting the encrypted evidence storage data to obtain evidence storage data, and finishing data evidence storage sharing.
2. The method according to claim 1, wherein the step S1 includes the following steps:
s11, calculating a hash value H of the evidence according to the evidence storage data;
s12, initiating an evidence hash uplink request by a user to obtain chaining data, wherein the chaining data comprises an identity identifier appID of the user, a hash value H of the evidence and a signature of the user to the appID and H;
s13, verifying the signature through the block chain, chaining the hash value H of the evidence, and generating a transaction number TxID;
and S14, returning the chain-recording result and the transaction number TxID to the user through the block chain.
3. The method according to claim 2, wherein the hash value H in step S11 is calculated by the following formula:
H=hash(ED)
in the above formula, hash is a hash function, and ED is evidence storage data.
4. The method according to claim 1, wherein the calculation formula of the encryption key in step S21 is as follows:
key=hash(sk||TxID)
in the above formula, the hash is a hash function.
5. The method according to claim 1, wherein the step S3 includes the following steps:
s31, sending an { EDlistGetReq, appID } evidence list to a certificate storage center through a user, wherein the EDlistGetReq is a list request identifier;
s32, returning an evidence list appIDlist corresponding to the identity identifier appID to the user through the evidence storage center;
s33, selecting target evidence fileName in the evidence listi
S34, sending { EDGetReq, appID, TxID through useri,fileNamei,LiInitiating an evidence obtaining request, wherein EDGetReq is an evidence obtaining request identifier;
s35, inquiring the evidence obtaining request and returning the encrypted evidence storing data C in the evidence storing center;
s36, calculating a decryption key1 by the user;
s37, decrypting the encrypted evidence data C by the user according to the decryption key1 to obtain evidence ED 1;
s38, selecting target evidence in the evidence list by the user, and encrypting the decryption key1 by the public key pk of the evidence acquirer to obtain Epk(key1), Epk(key1) and information of target evidence { TxIDi,fileNamei,LiSending the data to an evidence acquirer;
s39, sending { EDGetReq, appID, TxID through evidence acquireri,fileNamei,LiInitiating an evidence acquisition request;
s310, inquiring the evidence obtaining request and returning the encrypted evidence storing data C in the evidence storing center;
s311, decrypting the key2 by the evidence acquirer;
s312, the evidence acquirer decrypts the encrypted evidence storage data C according to the decryption key2 to acquire evidence ED 2.
6. The method for sharing the data certificate based on the blockchain according to claim 5, wherein the calculation formula of the decryption key1 is as follows:
key1=hash(sk||TxIDi)
the formula for the evidence ED1 is:
ED1=Dkey1(C)
the calculation formula of the decryption key2 is as follows:
key2=Dsk(Epk(key1))
the formula for the evidence ED2 is:
ED=Dkey2(C)。
CN202010994302.0A 2020-09-21 2020-09-21 Data storage certificate sharing method based on block chain Active CN112153039B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010994302.0A CN112153039B (en) 2020-09-21 2020-09-21 Data storage certificate sharing method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010994302.0A CN112153039B (en) 2020-09-21 2020-09-21 Data storage certificate sharing method based on block chain

Publications (2)

Publication Number Publication Date
CN112153039A CN112153039A (en) 2020-12-29
CN112153039B true CN112153039B (en) 2022-03-18

Family

ID=73893499

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010994302.0A Active CN112153039B (en) 2020-09-21 2020-09-21 Data storage certificate sharing method based on block chain

Country Status (1)

Country Link
CN (1) CN112153039B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113255003B (en) * 2021-06-15 2022-03-18 中国电子科技网络信息安全有限公司 Block chain system safety management and control method
CN113886101B (en) * 2021-09-27 2023-04-21 华南理工大学 Big data sharing and concurrent evidence method based on blockchain technology
CN113886499B (en) * 2021-10-19 2022-09-30 赛维森(广州)医疗科技服务有限公司 Pathology data sharing method and system based on block chain and computing equipment

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107888375A (en) * 2017-11-08 2018-04-06 深圳市携网科技有限公司 A kind of electronic evidence safety system and method based on block chain technology
CN108920966A (en) * 2018-06-25 2018-11-30 北京奇虎科技有限公司 A kind of block chain deposits card, evidence collecting method and device
CN109002732A (en) * 2018-07-17 2018-12-14 深圳前海微众银行股份有限公司 Data deposit card method, apparatus and system and data evidence collecting method
CN110535662A (en) * 2019-09-03 2019-12-03 山东浪潮质量链科技有限公司 The method and system that user operation records are realized in card service are deposited based on block chain data
CN110990879A (en) * 2019-11-08 2020-04-10 中国电子科技网络信息安全有限公司 Data evidence storing method based on block chain
CN111130770A (en) * 2019-12-18 2020-05-08 杭州云萃流图网络科技有限公司 Block chain based information evidence storage method and system, user terminal, electronic equipment and storage medium
CN111200501A (en) * 2019-12-31 2020-05-26 杭州趣链科技有限公司 Electronic evidence storage service system based on block chain
WO2020119265A1 (en) * 2018-12-13 2020-06-18 阿里巴巴集团控股有限公司 Blockchain-based evidence collection method and device
CN111353180A (en) * 2020-03-30 2020-06-30 北京海益同展信息科技有限公司 Block chain evidence storing method, evidence obtaining method and system
CN111444257A (en) * 2020-02-11 2020-07-24 江苏荣泽信息科技股份有限公司 Block chain-based electronic evidence storage method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11108559B2 (en) * 2019-01-02 2021-08-31 International Business Machines Corporation Producing proof of receipt, existence and other data provenance evidence

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107888375A (en) * 2017-11-08 2018-04-06 深圳市携网科技有限公司 A kind of electronic evidence safety system and method based on block chain technology
CN108920966A (en) * 2018-06-25 2018-11-30 北京奇虎科技有限公司 A kind of block chain deposits card, evidence collecting method and device
CN109002732A (en) * 2018-07-17 2018-12-14 深圳前海微众银行股份有限公司 Data deposit card method, apparatus and system and data evidence collecting method
WO2020119265A1 (en) * 2018-12-13 2020-06-18 阿里巴巴集团控股有限公司 Blockchain-based evidence collection method and device
CN110535662A (en) * 2019-09-03 2019-12-03 山东浪潮质量链科技有限公司 The method and system that user operation records are realized in card service are deposited based on block chain data
CN110990879A (en) * 2019-11-08 2020-04-10 中国电子科技网络信息安全有限公司 Data evidence storing method based on block chain
CN111130770A (en) * 2019-12-18 2020-05-08 杭州云萃流图网络科技有限公司 Block chain based information evidence storage method and system, user terminal, electronic equipment and storage medium
CN111200501A (en) * 2019-12-31 2020-05-26 杭州趣链科技有限公司 Electronic evidence storage service system based on block chain
CN111444257A (en) * 2020-02-11 2020-07-24 江苏荣泽信息科技股份有限公司 Block chain-based electronic evidence storage method and system
CN111353180A (en) * 2020-03-30 2020-06-30 北京海益同展信息科技有限公司 Block chain evidence storing method, evidence obtaining method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
区块链技术在电子数据存证取证中的应用;朱兴雄;《生态互联 数字电力——2019电力行业信息化年会论文集》;20190907;全文 *

Also Published As

Publication number Publication date
CN112153039A (en) 2020-12-29

Similar Documents

Publication Publication Date Title
CN108418680B (en) Block chain key recovery method and medium based on secure multi-party computing technology
CN112153039B (en) Data storage certificate sharing method based on block chain
US11196573B2 (en) Secure de-centralized domain name system
CN107528688B (en) Block chain key keeping and recovering method and device based on encryption delegation technology
CN109829326B (en) Cross-domain authentication and fair audit de-duplication cloud storage system based on block chain
CN104579694B (en) A kind of identity identifying method and system
TWI744532B (en) Methods and systems to establish trusted peer-to-peer communications between nodes in a blockchain network
CN101156352B (en) Authentication method, system and authentication center based on mobile network P2P communication
US20200412554A1 (en) Id as service based on blockchain
KR102580509B1 (en) Computer-implemented system and method enabling secure storage of large-scale blockchains through multiple storage nodes
US20130191632A1 (en) System and method for securing private keys issued from distributed private key generator (d-pkg) nodes
KR102307574B1 (en) Cloud data storage system based on blockchain and method for storing in cloud
CN112532580B (en) Data transmission method and system based on block chain and proxy re-encryption
JP2001326632A (en) Distribution group management system and method
CN109146479B (en) Data encryption method based on block chain
CN104683351A (en) System and method for controlling anonymous hospitalizing and security access of medical information based on property
CN113225302B (en) Data sharing system and method based on proxy re-encryption
CN112311537A (en) Block chain-based equipment access authentication system and method
CN114866323B (en) User-controllable privacy data authorization sharing system and method
US20110010544A1 (en) Process distribution system, authentication server, distribution server, and process distribution method
CN111314066B (en) Block chain-based data transfer method, terminal and computer-readable storage medium
CN114268482A (en) Rapid strategy retrieval method based on attribute bloom filter
Liou et al. T-auth: A novel authentication mechanism for the IoT based on smart contracts and PUFs
CN116167017A (en) Shoe original design AI digital copyright management system based on blockchain technology
CN115913677A (en) Block chain-based collaboration edge storage data privacy protection system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant