CN112153039B - Data storage certificate sharing method based on block chain - Google Patents
Data storage certificate sharing method based on block chain Download PDFInfo
- Publication number
- CN112153039B CN112153039B CN202010994302.0A CN202010994302A CN112153039B CN 112153039 B CN112153039 B CN 112153039B CN 202010994302 A CN202010994302 A CN 202010994302A CN 112153039 B CN112153039 B CN 112153039B
- Authority
- CN
- China
- Prior art keywords
- evidence
- data
- user
- storage
- txid
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Abstract
The invention discloses a data evidence sharing method based on a block chain. The invention provides a safe and reliable data encryption storage scheme for users based on the block chain technology, the users share the evidence data to other users in a linked mode, and the other users can obtain the evidence data at any time; the invention records the data hash on the block chain, and provides the trustable integrity check for the data storage certificate; the invention stores the data of the deposit certificate in an encrypted way, the encryption key is derived from the private key of the user and the transaction ID, and the deposit certificate center provides a reliable storage mode to realize the safe storage of the data; according to the method and the device, the evidence storage data is shared in the form of the evidence storage mapping address, the evidence storage data is shared to the appointed user and is shared offline, and the user experience is improved.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a data evidence sharing method based on a block chain.
Background
The existing data storage system has the following risks:
(1) the data lacks public confirmation. Data release is submitted by a resource party independently, and the system lacks uniqueness authentication and time sequence notarization registration for the data, so that the problems of repeated registration of the data and the like may exist.
(2) The data management and control responsibility is too centralized. Data access authorization, sharing exchange and the like are all completed on an information storage and verification sharing platform, so that a resource provider and a demander are required to fully trust the platform, and problems often exist in practical application.
One of the core characteristics of the blockchain technology is non-tamper-able, so that blockchain data storage is a main mode for future data storage, and most of the current blockchain-based data storage solutions have the problems of complex operation process, high difficulty, user experience unfriendliness and the like.
Disclosure of Invention
Aiming at the defects in the prior art, the data evidence sharing method based on the block chain solves the problems of complex operation process, high difficulty and unfriendly user experience of most of the existing data evidence sharing solutions based on the block chain.
In order to achieve the purpose of the invention, the invention adopts the technical scheme that: a data evidence sharing method based on a block chain comprises the following steps:
s1, recording the hash value of the certificate storage data on a block chain, and returning a transaction number corresponding to the hash value to the user through the block chain;
s2, deriving a symmetric encryption key according to the private key of the user and the transaction number to encrypt the certificate-storing data, storing the user name, the transaction number, the file name of the encrypted data and the encrypted data in a certificate-storing center, and updating an evidence list of the user;
s3, requesting a evidence storage list from the evidence storage center, selecting a transaction number, a file name and an evidence storage mapping address corresponding to the target data, sending the transaction number, the file name and the evidence storage mapping address to an evidence acquirer, initiating an evidence acquisition request to the evidence storage center through the evidence acquirer, downloading the encrypted data, locally decrypting the encrypted data to acquire evidence storage data, and completing data evidence storage sharing.
Further: the specific steps of step S1 are:
s11, calculating a hash value H of the evidence according to the evidence storage data;
s12, initiating an evidence hash uplink request by a user to obtain chaining data, wherein the chaining data comprises an identity identifier appID of the user, a hash value H of the evidence and a signature of the user to the appID and H;
s13, verifying the signature through the block chain, chaining the hash value H of the evidence, and generating a transaction number TxID;
and S14, returning the chain-recording result and the transaction number TxID to the user through the block chain.
Further: the hash value H in step S11 is calculated by the following formula:
H=hash(ED)
in the above formula, hash is a hash function, and ED is evidence storage data.
Further: the specific steps of step S2 are:
s21, deriving a data encryption key according to the user private key sk and the transaction number;
s22, generating encrypted certificate storing data C according to the certificate storing data and the encryption key, wherein the calculation formula is as follows: c ═ E (ed), where E is a symmetric encryption algorithm;
s23, sending the identity identifier appID, the transaction number TxID, the file name fileName of the card storage data and the encrypted card storage data C of the user to a card storage center;
s24, generating an evidence storage mapping address L according to the encrypted evidence storage data C of the evidence storage center;
s25, generating evidence storage mapping address L according to new datai;
S26, updating the user evidence list, adding new data into the user evidence list appIDlist, and calculating the formula as appIDlist ═ appID, TxIDi,fileNamei,Li} U { appID, TxID, fileName, L }, where TxIDiNumbering new transactions, fileNameiThe file name of the certificate storing data of the new data;
and S27, returning the user evidence list appIDlist to the user through the evidence storage center.
Further: the calculation formula of the encryption key in step S21 is:
key=hash(sk||TxID)
in the above formula, the hash is a hash function.
Further: the specific steps of step S3 are:
s31, sending an { EDlistGetReq, appID } request list to a license storage center through a user, wherein the EDlistGetReq is a list request identifier;
s32, returning an evidence list appIDlist corresponding to the identity identifier appID to the user through the evidence storage center;
s33, selecting target evidence fileName in the evidence listi;
S34, sending { EDGetReq, appID, TxID through useri,fileNamei,LiInitiating an evidence obtaining request, wherein EDGetReq is an evidence obtaining request identifier;
s35, inquiring the evidence obtaining request and returning the encrypted evidence storing data C in the evidence storing center;
s36, calculating a decryption key1 by the user;
s37, decrypting the encrypted evidence data C by the user according to the decryption key1 to obtain evidence ED 1;
s38, selecting target evidence in the evidence list by the user, and encrypting the decryption key1 by the public key pk of the evidence acquirer to obtain Epk(key1), Epk(key1) and information of target evidence { TxIDi,fileNamei,LiSending the data to an evidence acquirer;
s39, sending { EDGetReq, appID, TxID through evidence acquireri,fileNamei,LiInitiating an evidence acquisition request;
s310, inquiring the evidence obtaining request and returning the encrypted evidence storing data C in the evidence storing center;
s311, decrypting the key2 by the evidence acquirer;
s312, the evidence acquirer decrypts the encrypted evidence storage data C according to the decryption key2 to acquire evidence ED 2.
Further: the calculation formula of the decryption key1 is as follows:
key1=hash(sk||TxIDi)
the formula for the evidence ED1 is:
ED1=Dkey1(C)
the calculation formula of the decryption key2 is as follows:
key2=Dsk(Epk(key1))
the formula for the evidence ED2 is:
ED=Dkey2(C)。
the invention has the beneficial effects that: the invention provides a safe and reliable data encryption storage scheme for users based on the block chain technology, the users share the evidence data to other users in a linked mode, and other users can obtain the evidence data at any time. The method has the following specific beneficial effects:
(1) the invention records the data hash on the block chain, and provides the trustable integrity check for the data storage certificate;
(2) the invention stores the data of the deposit certificate in an encrypted way, the encryption key is derived from the private key of the user and the transaction ID, and the deposit certificate center provides a reliable storage mode to realize the safe storage of the data;
(3) according to the method and the device, the evidence storage data is shared in the form of the evidence storage mapping address, the evidence storage data is shared to the appointed user and is shared offline, and the user experience is improved.
Drawings
FIG. 1 is a flow chart of the present invention;
fig. 2 is a working principle diagram of the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate the understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and it will be apparent to those skilled in the art that various changes may be made without departing from the spirit and scope of the invention as defined and defined in the appended claims, and all matters produced by the invention using the inventive concept are protected.
The signature algorithm used in the invention is SM2 signature algorithm (GM/T0003), the encryption algorithms used are SM2 encryption algorithm (GM/T0003) and SM4 symmetric encryption algorithm (GM/T0002), and the hash algorithm used is SM3 hash algorithm (GM/T0004).
As shown in fig. 1 and fig. 2 together, a block chain-based data evidence sharing method includes three parts, namely evidence chaining, evidence storage and evidence sharing. The method comprises the following steps:
s1, recording the hash value of the certificate storage data on a block chain, and returning a transaction number corresponding to the hash value to the user through the block chain; the method comprises the following specific steps:
s11, calculating a hash value H of the evidence according to the evidence storage data; the hash value H is calculated as:
H=hash(ED)
in the above formula, hash is a hash function, and ED is evidence storage data.
S12, initiating an evidence hash uplink request by a user to obtain chaining data, wherein the chaining data comprises an identity identifier appID of the user, a hash value H of the evidence and a signature of the user to the appID and H;
s13, verifying the signature through the block chain, chaining the hash value H of the evidence, and generating a transaction number TxID;
and S14, returning the chain-recording result and the transaction number TxID to the user through the block chain.
S2, deriving a symmetric encryption key according to the private key of the user and the transaction number to encrypt the certificate-storing data, storing the user name, the transaction number, the file name of the encrypted data and the encrypted data in a certificate-storing center, and updating an evidence list of the user; the method comprises the following specific steps:
s21, deriving a data encryption key according to the user private key sk and the transaction number; the calculation formula of the encryption key is as follows:
key=hash(sk||TxID)
in the above formula, the hash is a hash function.
S22, generating encrypted certificate storing data C according to the certificate storing data and the encryption key, wherein the calculation formula is as follows: c ═ E (ed), where E is a symmetric encryption algorithm;
s23, sending the identity identifier appID, the transaction number TxID, the file name fileName of the card storage data and the encrypted card storage data C of the user to a card storage center;
s24, generating an evidence storage mapping address L according to the encrypted evidence storage data C of the evidence storage center;
s25, generating evidence storage mapping address L according to new datai;
S26, updating the user evidence list, adding new data into the user evidence list appIDlist, and calculating the formula as appIDlist ═ appID, TxIDi,fileNamei,Li} U { appID, TxID, fileName, L }, which isMiddle TxIDiNumbering new transactions, fileNameiThe file name of the certificate storing data of the new data;
and S27, returning the user evidence list appIDlist to the user through the evidence storage center.
S3, requesting a evidence storage list from the evidence storage center, selecting a transaction number, a file name and an evidence storage mapping address corresponding to the target data, sending the transaction number, the file name and the evidence storage mapping address to an evidence acquirer, initiating an evidence acquisition request to the evidence storage center through the evidence acquirer, downloading the encrypted data, locally decrypting the encrypted data to acquire evidence storage data, and completing data evidence storage sharing. The method comprises the following specific steps:
s31, sending an { EDlistGetReq, appID } request list to a license storage center through a user, wherein the EDlistGetReq is a list request identifier;
s32, returning an evidence list appIDlist corresponding to the identity identifier appID to the user through the evidence storage center;
s33, selecting target evidence fileName in the evidence listi;
S34, sending { EDGetReq, appID, TxID through useri,fileNamei,LiInitiating an evidence obtaining request, wherein EDGetReq is an evidence obtaining request identifier;
s35, inquiring the evidence obtaining request and returning the encrypted evidence storing data C in the evidence storing center;
s36, calculating a decryption key1 by the user; the calculation formula of the decryption key1 is:
key1=hash(sk||TxIDi)
s37, decrypting the encrypted evidence data C by the user according to the decryption key1 to obtain evidence ED 1; the formula for the calculation of evidence ED1 is:
ED1=Dkey1(C)
s38, selecting target evidence in the evidence list by the user, and encrypting the decryption key1 by the public key pk of the evidence acquirer to obtain Epk(key1), Epk(key1) and information of target evidence { TxIDi,fileNamei,LiSending the data to an evidence acquirer;
s39, sending { EDGetReq, appID, TxI through evidence acquirerDi,fileNamei,LiInitiating an evidence acquisition request;
s310, inquiring the evidence obtaining request and returning the encrypted evidence storing data C in the evidence storing center;
s311, decrypting the key2 by the evidence acquirer; the calculation formula of the decryption key2 is:
key2=Dsk(Epk(key1))
s312, the evidence acquirer decrypts the encrypted evidence storage data C according to the decryption key2 to acquire evidence ED 2. The formula for the calculation of evidence ED2 is:
ED=Dkey2(C)
the invention provides a safe and reliable data encryption storage scheme for users based on the block chain technology, the users share the evidence data to other users in a linked mode, and other users can obtain the evidence data at any time.
Claims (6)
1. A data evidence sharing method based on a block chain is characterized by comprising the following steps:
s1, recording the hash value of the certificate storage data on a block chain, and returning a transaction number corresponding to the hash value to the user through the block chain;
s2, deriving a symmetric encryption key according to the private key and the transaction number of the user to encrypt the certificate storing data, storing the identity identifier, the transaction number, the certificate storing data file name and the encrypted certificate storing data of the user in a certificate storing center, and updating an evidence list of the user;
the specific steps of step S2 are:
s21, deriving a data encryption key according to the user private key sk and the transaction number;
s22, generating encrypted certificate storing data C according to the certificate storing data and the encryption key, wherein the calculation formula is as follows: c ═ E (ed), where E is a symmetric encryption algorithm;
s23, sending the identity identifier appID, the transaction number TxID, the certificate storage data fileName and the encrypted certificate storage data C of the user to a certificate storage center;
s24, generating an evidence storage mapping address L according to the encrypted evidence storage data C of the evidence storage center;
s25, generating evidence storage mapping address L according to new datai;
S26, updating the evidence list, adding new data into the evidence list appIDlist, and calculating the formula as appIDlist ═ appID, TxIDi,fileNamei,Li} U { appID, TxID, fileName, L }, where TxIDiNumbering new transactions, fileNameiThe file name of the certificate storing data of the new data;
s27, returning an evidence list appIDlist to the user through the evidence storage center;
s3, requesting an evidence list from the evidence storage center, selecting a transaction number, a file name of evidence storage data and an evidence storage mapping address corresponding to target data, sending the transaction number, the file name of evidence storage data and the evidence storage mapping address to an evidence acquirer, initiating an evidence acquisition request to the evidence storage center through the evidence acquirer, downloading encrypted evidence storage data, locally decrypting the encrypted evidence storage data to obtain evidence storage data, and finishing data evidence storage sharing.
2. The method according to claim 1, wherein the step S1 includes the following steps:
s11, calculating a hash value H of the evidence according to the evidence storage data;
s12, initiating an evidence hash uplink request by a user to obtain chaining data, wherein the chaining data comprises an identity identifier appID of the user, a hash value H of the evidence and a signature of the user to the appID and H;
s13, verifying the signature through the block chain, chaining the hash value H of the evidence, and generating a transaction number TxID;
and S14, returning the chain-recording result and the transaction number TxID to the user through the block chain.
3. The method according to claim 2, wherein the hash value H in step S11 is calculated by the following formula:
H=hash(ED)
in the above formula, hash is a hash function, and ED is evidence storage data.
4. The method according to claim 1, wherein the calculation formula of the encryption key in step S21 is as follows:
key=hash(sk||TxID)
in the above formula, the hash is a hash function.
5. The method according to claim 1, wherein the step S3 includes the following steps:
s31, sending an { EDlistGetReq, appID } evidence list to a certificate storage center through a user, wherein the EDlistGetReq is a list request identifier;
s32, returning an evidence list appIDlist corresponding to the identity identifier appID to the user through the evidence storage center;
s33, selecting target evidence fileName in the evidence listi;
S34, sending { EDGetReq, appID, TxID through useri,fileNamei,LiInitiating an evidence obtaining request, wherein EDGetReq is an evidence obtaining request identifier;
s35, inquiring the evidence obtaining request and returning the encrypted evidence storing data C in the evidence storing center;
s36, calculating a decryption key1 by the user;
s37, decrypting the encrypted evidence data C by the user according to the decryption key1 to obtain evidence ED 1;
s38, selecting target evidence in the evidence list by the user, and encrypting the decryption key1 by the public key pk of the evidence acquirer to obtain Epk(key1), Epk(key1) and information of target evidence { TxIDi,fileNamei,LiSending the data to an evidence acquirer;
s39, sending { EDGetReq, appID, TxID through evidence acquireri,fileNamei,LiInitiating an evidence acquisition request;
s310, inquiring the evidence obtaining request and returning the encrypted evidence storing data C in the evidence storing center;
s311, decrypting the key2 by the evidence acquirer;
s312, the evidence acquirer decrypts the encrypted evidence storage data C according to the decryption key2 to acquire evidence ED 2.
6. The method for sharing the data certificate based on the blockchain according to claim 5, wherein the calculation formula of the decryption key1 is as follows:
key1=hash(sk||TxIDi)
the formula for the evidence ED1 is:
ED1=Dkey1(C)
the calculation formula of the decryption key2 is as follows:
key2=Dsk(Epk(key1))
the formula for the evidence ED2 is:
ED=Dkey2(C)。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010994302.0A CN112153039B (en) | 2020-09-21 | 2020-09-21 | Data storage certificate sharing method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010994302.0A CN112153039B (en) | 2020-09-21 | 2020-09-21 | Data storage certificate sharing method based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112153039A CN112153039A (en) | 2020-12-29 |
CN112153039B true CN112153039B (en) | 2022-03-18 |
Family
ID=73893499
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010994302.0A Active CN112153039B (en) | 2020-09-21 | 2020-09-21 | Data storage certificate sharing method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112153039B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113255003B (en) * | 2021-06-15 | 2022-03-18 | 中国电子科技网络信息安全有限公司 | Block chain system safety management and control method |
CN113886101B (en) * | 2021-09-27 | 2023-04-21 | 华南理工大学 | Big data sharing and concurrent evidence method based on blockchain technology |
CN113886499B (en) * | 2021-10-19 | 2022-09-30 | 赛维森(广州)医疗科技服务有限公司 | Pathology data sharing method and system based on block chain and computing equipment |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107888375A (en) * | 2017-11-08 | 2018-04-06 | 深圳市携网科技有限公司 | A kind of electronic evidence safety system and method based on block chain technology |
CN108920966A (en) * | 2018-06-25 | 2018-11-30 | 北京奇虎科技有限公司 | A kind of block chain deposits card, evidence collecting method and device |
CN109002732A (en) * | 2018-07-17 | 2018-12-14 | 深圳前海微众银行股份有限公司 | Data deposit card method, apparatus and system and data evidence collecting method |
CN110535662A (en) * | 2019-09-03 | 2019-12-03 | 山东浪潮质量链科技有限公司 | The method and system that user operation records are realized in card service are deposited based on block chain data |
CN110990879A (en) * | 2019-11-08 | 2020-04-10 | 中国电子科技网络信息安全有限公司 | Data evidence storing method based on block chain |
CN111130770A (en) * | 2019-12-18 | 2020-05-08 | 杭州云萃流图网络科技有限公司 | Block chain based information evidence storage method and system, user terminal, electronic equipment and storage medium |
CN111200501A (en) * | 2019-12-31 | 2020-05-26 | 杭州趣链科技有限公司 | Electronic evidence storage service system based on block chain |
WO2020119265A1 (en) * | 2018-12-13 | 2020-06-18 | 阿里巴巴集团控股有限公司 | Blockchain-based evidence collection method and device |
CN111353180A (en) * | 2020-03-30 | 2020-06-30 | 北京海益同展信息科技有限公司 | Block chain evidence storing method, evidence obtaining method and system |
CN111444257A (en) * | 2020-02-11 | 2020-07-24 | 江苏荣泽信息科技股份有限公司 | Block chain-based electronic evidence storage method and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11108559B2 (en) * | 2019-01-02 | 2021-08-31 | International Business Machines Corporation | Producing proof of receipt, existence and other data provenance evidence |
-
2020
- 2020-09-21 CN CN202010994302.0A patent/CN112153039B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107888375A (en) * | 2017-11-08 | 2018-04-06 | 深圳市携网科技有限公司 | A kind of electronic evidence safety system and method based on block chain technology |
CN108920966A (en) * | 2018-06-25 | 2018-11-30 | 北京奇虎科技有限公司 | A kind of block chain deposits card, evidence collecting method and device |
CN109002732A (en) * | 2018-07-17 | 2018-12-14 | 深圳前海微众银行股份有限公司 | Data deposit card method, apparatus and system and data evidence collecting method |
WO2020119265A1 (en) * | 2018-12-13 | 2020-06-18 | 阿里巴巴集团控股有限公司 | Blockchain-based evidence collection method and device |
CN110535662A (en) * | 2019-09-03 | 2019-12-03 | 山东浪潮质量链科技有限公司 | The method and system that user operation records are realized in card service are deposited based on block chain data |
CN110990879A (en) * | 2019-11-08 | 2020-04-10 | 中国电子科技网络信息安全有限公司 | Data evidence storing method based on block chain |
CN111130770A (en) * | 2019-12-18 | 2020-05-08 | 杭州云萃流图网络科技有限公司 | Block chain based information evidence storage method and system, user terminal, electronic equipment and storage medium |
CN111200501A (en) * | 2019-12-31 | 2020-05-26 | 杭州趣链科技有限公司 | Electronic evidence storage service system based on block chain |
CN111444257A (en) * | 2020-02-11 | 2020-07-24 | 江苏荣泽信息科技股份有限公司 | Block chain-based electronic evidence storage method and system |
CN111353180A (en) * | 2020-03-30 | 2020-06-30 | 北京海益同展信息科技有限公司 | Block chain evidence storing method, evidence obtaining method and system |
Non-Patent Citations (1)
Title |
---|
区块链技术在电子数据存证取证中的应用;朱兴雄;《生态互联 数字电力——2019电力行业信息化年会论文集》;20190907;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112153039A (en) | 2020-12-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108418680B (en) | Block chain key recovery method and medium based on secure multi-party computing technology | |
CN112153039B (en) | Data storage certificate sharing method based on block chain | |
US11196573B2 (en) | Secure de-centralized domain name system | |
CN107528688B (en) | Block chain key keeping and recovering method and device based on encryption delegation technology | |
CN109829326B (en) | Cross-domain authentication and fair audit de-duplication cloud storage system based on block chain | |
CN104579694B (en) | A kind of identity identifying method and system | |
TWI744532B (en) | Methods and systems to establish trusted peer-to-peer communications between nodes in a blockchain network | |
CN101156352B (en) | Authentication method, system and authentication center based on mobile network P2P communication | |
US20200412554A1 (en) | Id as service based on blockchain | |
KR102580509B1 (en) | Computer-implemented system and method enabling secure storage of large-scale blockchains through multiple storage nodes | |
US20130191632A1 (en) | System and method for securing private keys issued from distributed private key generator (d-pkg) nodes | |
KR102307574B1 (en) | Cloud data storage system based on blockchain and method for storing in cloud | |
CN112532580B (en) | Data transmission method and system based on block chain and proxy re-encryption | |
JP2001326632A (en) | Distribution group management system and method | |
CN109146479B (en) | Data encryption method based on block chain | |
CN104683351A (en) | System and method for controlling anonymous hospitalizing and security access of medical information based on property | |
CN113225302B (en) | Data sharing system and method based on proxy re-encryption | |
CN112311537A (en) | Block chain-based equipment access authentication system and method | |
CN114866323B (en) | User-controllable privacy data authorization sharing system and method | |
US20110010544A1 (en) | Process distribution system, authentication server, distribution server, and process distribution method | |
CN111314066B (en) | Block chain-based data transfer method, terminal and computer-readable storage medium | |
CN114268482A (en) | Rapid strategy retrieval method based on attribute bloom filter | |
Liou et al. | T-auth: A novel authentication mechanism for the IoT based on smart contracts and PUFs | |
CN116167017A (en) | Shoe original design AI digital copyright management system based on blockchain technology | |
CN115913677A (en) | Block chain-based collaboration edge storage data privacy protection system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |