CN112712428A - Block chain-based electronic certificate storage method and electronic equipment - Google Patents

Block chain-based electronic certificate storage method and electronic equipment Download PDF

Info

Publication number
CN112712428A
CN112712428A CN202011488680.8A CN202011488680A CN112712428A CN 112712428 A CN112712428 A CN 112712428A CN 202011488680 A CN202011488680 A CN 202011488680A CN 112712428 A CN112712428 A CN 112712428A
Authority
CN
China
Prior art keywords
data
terminal
storage
evidence
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202011488680.8A
Other languages
Chinese (zh)
Inventor
赵书鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Golden Lion Technology Co Ltd
Original Assignee
Ningbo Golden Lion Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Golden Lion Technology Co Ltd filed Critical Ningbo Golden Lion Technology Co Ltd
Priority to CN202011488680.8A priority Critical patent/CN112712428A/en
Publication of CN112712428A publication Critical patent/CN112712428A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the disclosure discloses an electronic evidence storing method based on a block chain and electronic equipment. One embodiment of the method comprises: acquiring a certificate storage data set sent by a user; generating a timestamp; generating a data identifier based on the timestamp and the evidence storing data abstract; sending the evidence storage data set and the data identification to a first terminal; receiving a storage record table sent back by a first terminal; and sending the data identifier, the storage record table and the timestamp to a second terminal, wherein the second terminal generates a data block, and the second terminal issues the data block to a block chain. The method obtains the evidence data and generates a time stamp, and generates a data identifier according to the evidence data and the time stamp. The first terminal stores the storage certificate data and the data identification and generates a storage record table. The second terminal generates and publishes the data blocks in the blockchain. Different terminals are used for respectively finishing the storage of the certificate-storing data and the generation of the data blocks in the block chain, so that the storage efficiency is improved, and the safety of the certificate-storing data is also ensured.

Description

Block chain-based electronic certificate storage method and electronic equipment
Technical Field
The embodiment of the disclosure relates to the field of block chains and electronic evidence storage, in particular to an electronic evidence storage data storage method and electronic equipment based on the block chains.
Background
There are many "incredible" behaviors in the current social environment. The guaranty transaction between people can cause inevitable loss due to the factor of the guarantor or the information is falsified, and all evidences are changed, so that the original transaction information cannot be traced, and the victim cannot maintain the legal right of the victim to restore the real information of the transaction. Some traditional notarization departments also carry out some human tampering on notarization information due to some factors so as to achieve the private purpose. The evidence storing and obtaining method based on the block chain technology in the electronic evidence field can ensure the authenticity and credibility of the information to a certain extent and can accurately discriminate the authenticity of the information.
However, when the above method is used to perform electronic data verification in a block chain, the following technical problems still face:
first, the electronic evidence data about a case is usually not only one, and a plurality of pieces of electronic evidence data are respectively stored in a block chain, which brings great difficulty to the tracing and integrity verification of the electronic evidence data.
Secondly, the amount of information stored by the nodes in the blockchain is limited, and when the amount of the electronic evidence data is too large, the efficiency of querying and storing the electronic evidence data is seriously affected. In addition, the capacity of the nodes on the chain is too large, and the consensus efficiency of the whole block chain is also influenced.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the present disclosure propose block chain based electronic proof keeping methods and electronic devices to solve one or more of the technical problems mentioned in the background section above.
In a first aspect, some embodiments of the present disclosure provide a block chain-based electronic evidence storing method, including: acquiring a certificate storage data set sent by a user; generating a timestamp; generating a data identifier based on the timestamp and the evidence storing data abstract; sending the evidence storage data set and the data identification to a first terminal; receiving a storage record table sent back by a first terminal; and sending the data identifier, the storage record table and the timestamp to a second terminal, wherein the second terminal generates a data block, and the second terminal issues the data block to a block chain.
In a second aspect, some embodiments of the present disclosure provide an electronic device, comprising: one or more processors; a storage device having one or more programs stored thereon which, when executed by one or more processors, cause the one or more processors to implement a method as in any one of the first aspects.
In a third aspect, some embodiments of the disclosure provide a computer readable storage medium having a computer program stored thereon, wherein the program when executed by a processor implements a method as in any one of the first aspect.
The above embodiments of the present disclosure have the following advantages: first, a set of forensic data is obtained and a timestamp is generated. The evidence storage data set comprises evidence storage data and an abstract of the evidence storage data. The evidence storing data abstract is used for representing the evidence storing data. And secondly, generating a data identifier according to the timestamp and the evidence storing data abstract. And storing the certificate data set and the data identification by using the first terminal. The data identification can represent the evidence storage data, contains timestamp information, and can be used for connecting the evidence storage data corresponding to the same case in series and tracing according to the timestamp information. And the first terminal generates a storage record table according to the storage information. And then, sending the data identification, the storage record table and the time stamp to a second terminal, and generating a data block by the second terminal. The second terminal issues the data block into the blockchain. The first terminal stores certificate data and the second terminal generates uplink information. By utilizing the characteristics of decentralization and traceability of the block chain, the evidence storage data storage based on the block chain is realized. The method realizes reliable storage of the electronic evidence data by means of the block chain technology. And generating a data identifier based on the evidence storing data abstract and the timestamp, and effectively connecting a plurality of evidence storing data of the same case in series according to a time sequence. And storing the certificate data by using the first terminal and generating the uplink information by using the second terminal, thereby ensuring that only limited data is stored in the uplink data block. The data volume on the block chain is reduced, the storage efficiency is improved, and the security of the evidence storage data is also ensured.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and features are not necessarily drawn to scale.
FIG. 1 is an architectural diagram of an exemplary system in which some embodiments of the present disclosure may be applied;
fig. 2 is a flow diagram of some embodiments of a blockchain-based electronic proof of deposit method, in accordance with some embodiments of the present disclosure;
FIG. 3 is a schematic diagram of one application scenario of a blockchain-based electronic proof of deposit method, in accordance with some embodiments of the present disclosure;
FIG. 4 is a schematic block diagram of an electronic device suitable for use in implementing some embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings. The embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 illustrates an exemplary system architecture 100 to which embodiments of the blockchain-based electronic credentialing method of the present disclosure may be applied.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as a data storage application, a data analysis application, a natural language processing application, and the like.
The terminal apparatuses 101, 102, and 103 may be hardware or software. When the terminal devices 101, 102, 103 are hardware, they may be various terminal devices having a display screen, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like. When the terminal apparatuses 101, 102, 103 are software, they can be installed in the above-listed terminal apparatuses. It may be implemented as a plurality of software or software modules (e.g., to provide electronic credit data input, etc.), or as a single software or software module. And is not particularly limited herein.
The server 105 may be a server that provides various services, such as a server that stores the sets of credential data input by the terminal apparatuses 101, 102, 103. The server can process the received electronic certificate storing data and feed back a processing result (such as a storage record table) to the terminal equipment.
It should be noted that the block chain-based electronic certificate storing method provided by the embodiment of the present disclosure may be executed by the server 105, or may be executed by the terminal device.
It should be noted that the local area of the server 105 may also directly store the certificate data set, and in this case, the exemplary system architecture 100 may not include the terminal devices 101, 102, 103 and the network 104.
It should be noted that the terminal devices 101, 102, and 103 may also have storage-type applications installed therein, and in this case, the processing method may also be executed by the terminal devices 101, 102, and 103. At this point, the exemplary system architecture 100 may also not include the server 105 and the network 104.
The server 105 may be hardware or software. When the server 105 is hardware, it may be implemented as a distributed server cluster composed of a plurality of servers, or may be implemented as a single server. When the server is software, it may be implemented as a plurality of software or software modules (for example, for providing storage services), or as a single software or software module. And is not particularly limited herein.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to fig. 2, a flow 200 of some embodiments of a blockchain-based electronic proof of deposit method in accordance with the present disclosure is shown. The electronic evidence storing method based on the block chain comprises the following steps:
step 201, obtaining a certificate storing data set sent by a user.
In some embodiments, an executing entity (e.g., the electronic device shown in fig. 1) of the blockchain-based electronic evidence keeping method may directly obtain the evidence keeping data set sent by the user. Specifically, the evidence collection includes evidence data and an abstract of the evidence data. Evidence data is the product of information communication and may include, but is not limited to, one of the following: documents, notifications, contracts, transaction credentials, technology, and business secrets. The evidence storing data abstract is a string of ciphertext with fixed length obtained by inputting the evidence storing data into a one-way hash function. Specifically, the length of the ciphertext may be 128 bits. The length of the forensic data digest may be 128 bits.
At step 202, a timestamp is generated.
In some embodiments, the executing entity obtains a time set of the terminal. Specifically, the terminal may be the execution subject of the block chain-based electronic certificate authority method. And the execution main body acquires a time set of the processing evidence storage data set. Wherein the time set includes a year value, a month value, a date value, a time value, a minute value, and a second value. Specifically, the time set may be derived from the system time of the terminal. The system time can be Windows server time, and the system time can also be Linux system time.
Generating a timestamp based on the time set using the following equation:
t=((X*24+hour)*60+min)*60+sec,
wherein X represents the sum of the year value, month value and date value. hour represents a time value, min represents a minute value, sec represents a second value, and t represents a time stamp.
Step 203, generating a data identifier based on the timestamp and the evidence stored data abstract.
In some embodiments, the execution agent generates the data identifier based on the timestamp and the forensic data digest using the following equation:
S=H(t*hd mod N||R),
wherein d is a private key, N is a public key, and d is Nr,r∈ZpAnd p is any integer. h is the summary of evidence-storing data, hdTo the power of d of h. t is the timestamp and mod is the modulo process. R is any random number, | | is an operation or calculation character, H () is a hash function, and S is data identification.
And step 204, sending the evidence storage data set and the data identifier to the first terminal.
In some embodiments, the execution subject sends the evidence data set and the data identifier to the first terminal.
Optionally, the first terminal generates a storage record table. Specifically, the first terminal stores a certificate data set and a data identifier. And the first terminal determines the combination of the evidence storage data set and the data identification and the corresponding storage node position as a storage relation. And the first terminal writes the storage relation into the storage record table. The storage record table is in a table form, and each row of the storage record table has one storage relation.
The optional contents in the above step 202 and step 204 are: the technical content that the data identification is generated based on the timestamp and the evidence storage data abstract and is sent to the first terminal for storage is taken as an invention point of the embodiment of the disclosure, and the technical problems mentioned in the background art are solved. ". Factors that cause greater difficulty in tracing and verifying integrity of electronic evidence data are often as follows: the existing electronic evidence data are respectively stored in different blocks in a block chain, and lack of effective correlation among the blocks. If the above factors are solved, the effects of improving the tracing and integrity verification levels can be achieved. To this effect, the present disclosure introduces a timestamp and data identification to enable association between the electronic vouching data. First, a time stamp is generated for a storage request of the credential data from a user. And generating a data identifier according to the timestamp and the evidence storing data abstract. The data identification can uniquely represent the evidence storage data to be stored and simultaneously contains time information. Then, the first terminal stores the received evidence-storing data set and the data identification and generates a storage record table. Through the processing steps, the original unique time evidence is provided for the evidence storage data set by utilizing the time stamp, and a plurality of electronic evidences of the same case can be connected in series according to the data identification. Meanwhile, the electronic evidence can be ensured to be really traceable and cannot be tampered, so that the technical problem I is solved.
Step 205, receiving the storage record table sent back by the first terminal.
In some embodiments, the execution body receives a storage record table sent back by the first terminal.
Step 206, the data identifier, the storage log table and the time stamp are sent to the second terminal.
In some embodiments, the execution body transmits the data identification, the memory record table, and the time stamp to the second terminal.
Optionally, the second terminal generates the data block. Specifically, the second terminal generates a data block identifier. The second terminal determines a set of timestamps and data chunk identifications as a data header.
And the second terminal generates a data body and a hash value based on the certificate storage data. Specifically, the second terminal divides the certificate storing data into a first number of sub certificate storing data to obtain a sub certificate storing data set. And for each sub evidence data in the sub evidence data set, the second terminal generates the hash value of the sub evidence data by using a hash function so as to obtain the sub evidence data hash value set. Wherein the set of sub-LC data hash values comprises a first number of sub-LC data hash values. And the second terminal constructs the sub-certificate data hash value set into a tree data structure. The tree data structure comprises leaf nodes, middle nodes and root nodes. And the leaf node stores the sub evidence data hash value in the sub evidence data hash value set. The intermediate node stores the serial result of the sub evidence data hash values in the sub evidence data hash value set of the leaf node of the intermediate node. The root node stores a concatenation result of the sub-certificate data hash values in the first number of sub-certificate data hash value sets stored in the first number of leaf nodes. The second terminal determines the tree data structure as a data body.
And the second terminal determines the serial connection result of the sub-certificate data hash values of the first number of sub-certificate data hash value sets stored by the root node of the tree data structure as the hash value.
Optionally, the second terminal generates a hash digest based on the hash value. The second terminal generates a hash digest based on the sub-certificate data set and the hash value by using the following formula:
P=H(Y=e(C,C)y||M),
where e represents a bilinear mapping function and Y represents an integer generated using the bilinear mapping function. M is a random number and y represents a hash value. C represents a child credential data set and H () is a hash function. And | | l is an operation character, and P is a hash abstract.
Optionally, the second terminal determines the set of the hash value and the hash digest as the data tail. The second terminal determines a set of a data header, a data body, and a data trailer as a data block.
Optionally, the second terminal issues the data block into the blockchain. The second terminal invokes the smart contract. Wherein the intelligent contract comprises intelligent contract code, an instance, and execution data. In particular, an intelligent contract is a set of commitments defined in a digital form. The intelligent contract can control data in the block chain and appoint the rights and obligations of each participating terminal in the block chain. The smart contracts may be automatically executed by the computer system. In particular, the intelligent contract includes intelligent contract code, instances, and execution data. The intelligent contract code may be the source code of the intelligent contract. The intelligent contract code may be a piece of code that the computer system is capable of executing. An instance may be an actual service in a blockchain running an intelligent contract. The execution data may be data that remains in the blockchain after execution of an instance.
The second terminal runs the intelligent contract code and stores the data blocks in the block chain. Specifically, the intelligent contract for recording the block generates an instance and executes data during the operation process. The instance and the execution data are recorded in a blockchain.
Optional contents in the above step 206, namely: the technical contents of generating and respectively storing the information of the evidence storage data set and the information representing the evidence storage data set are taken as an invention point of the embodiment of the disclosure, and the technical problems mentioned in the background art are solved. In addition, the capacity of the nodes on the chain is too large, and the consensus efficiency of the whole block chain is also influenced. ". Factors that lead to poor efficiency in querying and storing e-proof data tend to be as follows: storing e-proof data directly in a block can affect query and storage efficiency because the amount of data is too large. If the above factors are solved, the effect of improving the query and storage efficiency can be achieved. To achieve this, the present disclosure stores the credential data set and information characterizing the credential data set in different terminals in the blockchain, respectively. First, the first terminal stores a certificate data set and a data identifier. The first terminal serves as a storage terminal for the electronic certificate storage method. The second terminal then stores the data block. The data block comprises a data identifier, a storage record table and a time stamp. Included in the data block is information related to the forensic data set, but not the original forensic data set. Thus, the amount of data in the data block is much smaller than the forensic data set. Finally, the second terminal issues the data block into the blockchain. And the safe and reliable storage of the evidence storage data set is realized by utilizing the decentralized characteristic of the block chain. Through the processing steps, the information of the evidence storage data set and the information of the representation evidence storage data set can be respectively stored in different terminals, so that the storage space of the nodes on the chain is effectively saved, the working efficiency of the whole block chain is improved, and the technical problem II is solved.
One embodiment presented in fig. 2 has the following beneficial effects: first, a set of forensic data is obtained and a timestamp is generated. The evidence storage data set comprises evidence storage data and an abstract of the evidence storage data. The evidence storing data abstract is used for representing the evidence storing data. And secondly, generating a data identifier according to the timestamp and the evidence storing data abstract. And storing the certificate data set and the data identification by using the first terminal. The data identification can represent the evidence storage data, contains timestamp information, and can be used for connecting the evidence storage data corresponding to the same case in series and tracing according to the timestamp information. And the first terminal generates a storage record table according to the storage information. And then, sending the data identification, the storage record table and the time stamp to a second terminal, and generating a data block by the second terminal. The second terminal issues the data block into the blockchain. The first terminal stores certificate data and the second terminal generates uplink data blocks. By utilizing the characteristics of decentralization and traceability of the block chain, the evidence storage data storage based on the block chain is realized. The method realizes reliable storage of the electronic evidence data by means of the block chain technology. And generating a data identifier based on the evidence storing data abstract and the timestamp, and effectively connecting a plurality of evidence storing data of the same case in series according to a time sequence. And storing the certificate data by using the first terminal and generating the uplink information by using the second terminal, thereby ensuring that only limited data is stored in the uplink data block. The data volume on the block chain is reduced, the storage efficiency is improved, and the security of the evidence storage data is also ensured.
With continued reference to fig. 3, a schematic diagram of one application scenario of the blockchain-based electronic proof method according to the present disclosure is shown.
In the application scenario of fig. 3, the user sends to the server a set of forensic data 301 to be stored. After the server receives the evidence data set, a timestamp and data identifier 302 is generated. The server sends the evidence data set and the data identification to the first terminal 303. The first terminal stores the certificate data set and the data identifier and generates a storage record table 304. Receiving the storage record table 305 sent back by the first terminal. The data identification, the stored record table and the time stamp are sent to the second terminal 306. The second terminal generates a data block and issues 307 into the blockchain.
The electronic evidence storing method based on the block chain provided by the embodiment of the application firstly generates the time stamp and the data identification. And storing the data set and the data identification by using the first terminal, and generating a storage record table. And generating and storing a data block based on the data identification, the storage record table and the time stamp by using the second terminal. The evidence storage data set and the data block are respectively stored, and only limited data are stored in the data block. The method can reduce the data amount stored on the block chain, improve the storage efficiency and ensure the security of the stored evidence data.
Referring now to FIG. 4, a block diagram of a computer system 400 suitable for use in implementing a server of an embodiment of the present disclosure is shown. The server shown in fig. 4 is only an example, and should not bring any limitation to the function and the scope of use of the embodiments of the present disclosure.
As shown in fig. 4, the computer system 400 includes a Central Processing Unit (CPU)401 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 402 or a program loaded from a storage section 408 into a Random Access Memory (RAM) 403. In the RAM 403, various programs and data necessary for the operation of the system 400 are also stored. The CPU 401, ROM 402, and RAM 403 are connected to each other via a bus 404. An Input/Output (I/O) interface 405 is also connected to the bus 404.
The following components are connected to the I/O interface 405: a storage section 406 including a hard disk and the like; and a communication section 407 including a Network interface card such as a LAN (Local Area Network) card, a modem, or the like. The communication section 407 performs communication processing via a network such as the internet. A drive 408 is also connected to the I/O interface 405 as needed. A removable medium 409 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted as necessary on the drive 408, so that a computer program read out therefrom is mounted as necessary in the storage section 406.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 407 and/or installed from the removable medium 409. The above-described functions defined in the method of the present disclosure are performed when the computer program is executed by a Central Processing Unit (CPU) 401. It should be noted that the computer readable medium in the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the C language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention in the present disclosure is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is possible without departing from the inventive concept as defined above. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.

Claims (10)

1. An electronic evidence storing method based on a block chain comprises the following steps:
acquiring a certificate storing data set sent by a user, wherein the certificate storing data set comprises certificate storing data and a certificate storing data abstract;
generating a timestamp;
generating a data identifier based on the timestamp and the evidence storing data abstract;
sending the evidence storage data set and the data identification to a first terminal, wherein the first terminal stores the evidence storage data set and the data identification, and the first terminal generates a storage record table;
receiving the storage record table sent back by the first terminal;
and sending the data identification, the storage record table and the timestamp to a second terminal, wherein the second terminal generates a data block, and the second terminal issues the data block to a block chain.
2. The method of claim 1, wherein the generating a timestamp comprises:
acquiring a time set of a terminal, wherein the time set comprises a year value, a month value, a date value, a time value, a minute value and a second value;
generating the timestamp based on the set of times using the following equation:
t=((X*24+hour)*60+min)*60+sec,
wherein X represents a sum of the year value, the month value, and the date value, hour represents the time value, min represents the minute value, sec represents the second value, and t represents the time stamp.
3. The method of claim 2, wherein generating a data identification based on the timestamp and the forensic data digest comprises:
generating the data identity using:
S=H(t*hd mod N||R),
wherein d is a private key, N is a public key, and d is Nr,r∈ZpP is any integer, h is the summary of the deposit data, hdIs the d power of H, t is the timestamp, mod is the modulo processing, R is any random number, | | is the arithmetic or operational character, H () is the hash function, and S is the data identifier.
4. The method of claim 3, wherein the first terminal generates a stored record table comprising:
the first terminal determines the combination of the evidence storage data set, the data identification and the corresponding storage node position as a storage relation;
and the first terminal writes the storage relation into the storage record table, wherein the storage record table is in a table form, and each row of the storage record table has one storage relation.
5. The method of claim 4, wherein the second terminal generating a data block comprises:
the second terminal generates a data block identifier;
the second terminal determines the set of the timestamp and the data block identifier as a data header;
the second terminal generates a data body and a hash value based on the certificate storage data;
the second terminal generates a hash abstract based on the hash value;
the second terminal determines the set of the hash value and the hash abstract as a data tail;
and the second terminal determines the set of the data head, the data body and the data tail as the data block.
6. The method of claim 5, wherein the second terminal generating a data body and a hash value based on the forensic data comprises:
the second terminal divides the certificate storing data into a first number of sub certificate storing data to obtain a sub certificate storing data set;
the second terminal generates a hash value of each sub certificate storage data in the sub certificate storage data set by using a hash function so as to obtain a sub certificate storage data hash value set, wherein the sub certificate storage data hash value set comprises a first number of sub certificate storage data hash values;
the second terminal constructs the sub evidence data hash value set into a tree-shaped data structure, wherein the tree-shaped data structure comprises leaf nodes, intermediate nodes and root nodes, the leaf nodes store sub evidence data hash values in the sub evidence data hash value set, the intermediate nodes store serial results of the sub evidence data hash values in the sub evidence data hash value set of the leaf nodes of the intermediate nodes, and the root nodes store serial results of the sub evidence data hash values in a first number of the sub evidence data hash value set stored in a first number of the leaf nodes;
the second terminal determines the tree data structure as the data body;
and the second terminal determines the serial connection result of the sub-certificate-storing data hash values of the first number of sub-certificate-storing data hash value sets stored by the root node of the tree-shaped data structure as the hash value.
7. The method of claim 6, wherein the second terminal generating a hash digest based on the hash value comprises:
the second terminal generates the hash digest based on the sub-certificate-deposit data set and the hash value by using the following formula:
P=H(Y=e(C,C)y||M),
wherein e represents a bilinear mapping function, Y represents an integer generated by using the bilinear mapping function, M is a random number, Y represents the hash value, C represents the sub-certificate data set, H () is a hash function, | | is a solving or operational character, and P is the hash digest.
8. The method of claim 7, wherein the second terminal publishing the data block into a blockchain comprises:
the second terminal calls an intelligent contract, wherein the intelligent contract comprises an intelligent contract code, an instance and execution data;
and the second terminal runs the intelligent contract code and stores the data block in a block chain.
9. A first terminal device comprising:
one or more processors;
a storage device having one or more programs stored thereon;
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-8.
10. A computer-readable storage medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the method of any one of claims 1-8.
CN202011488680.8A 2020-12-16 2020-12-16 Block chain-based electronic certificate storage method and electronic equipment Withdrawn CN112712428A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011488680.8A CN112712428A (en) 2020-12-16 2020-12-16 Block chain-based electronic certificate storage method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011488680.8A CN112712428A (en) 2020-12-16 2020-12-16 Block chain-based electronic certificate storage method and electronic equipment

Publications (1)

Publication Number Publication Date
CN112712428A true CN112712428A (en) 2021-04-27

Family

ID=75544205

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011488680.8A Withdrawn CN112712428A (en) 2020-12-16 2020-12-16 Block chain-based electronic certificate storage method and electronic equipment

Country Status (1)

Country Link
CN (1) CN112712428A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114338719A (en) * 2021-12-27 2022-04-12 杭州趣链科技有限公司 Evidence processing method and device based on alliance chain and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114338719A (en) * 2021-12-27 2022-04-12 杭州趣链科技有限公司 Evidence processing method and device based on alliance chain and electronic equipment

Similar Documents

Publication Publication Date Title
CN112214780B (en) Data processing method and device, intelligent equipment and storage medium
JP2023106528A (en) System and method for authenticating off-chain data based on proof verification
CN109274717B (en) Block chain based shared storage method, device, medium and electronic equipment
CN112100460B (en) Block chain-based network page evidence storing method, device, medium and electronic equipment
CN111316279A (en) Computer-implemented system and method for connecting a blockchain with a digital twin set
US11729000B2 (en) Methods and systems for introducing self-contained intent functionality into decentralized computer networks
CN110932859B (en) User information processing method, device and equipment and readable storage medium
CN111950030A (en) Data sharing storage method based on block chain, terminal equipment and storage medium
CN112435026B (en) Method and device for protecting file transaction information by using zero-knowledge proof and electronic equipment
CN111783148A (en) Justice-supporting lightweight multi-copy data cloud auditing method and device
CN111611621A (en) Block chain based distributed data encryption storage method and electronic equipment
US11870654B2 (en) Methods and systems for introducing self-contained intent functionality into decentralized computer networks
CN115203749B (en) Data transaction method and system based on block chain
CN111950032A (en) Block chain-based data storage method, terminal device and storage medium
CN111629063A (en) Block chain based distributed file downloading method and electronic equipment
CN110942305A (en) Real estate information management method and device based on block chain
CN112541775A (en) Transaction tracing method based on block chain, electronic device and computer storage medium
CN113961956A (en) Method, device, equipment and medium for generating and applying tagged network information service
CN113206746B (en) Digital certificate management method and device
CN112712428A (en) Block chain-based electronic certificate storage method and electronic equipment
CN115705601A (en) Data processing method and device, computer equipment and storage medium
CN112182108A (en) Block chain based distributed data storage updating method and electronic equipment
US20200043016A1 (en) Network node for processing measurement data
CN111181920A (en) Encryption and decryption method and device
CN115085934A (en) Contract management method based on block chain and combined key and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20210427

WW01 Invention patent application withdrawn after publication