CN114154189A - Two-section type Hash chain link certificate storing method for data or file - Google Patents
Two-section type Hash chain link certificate storing method for data or file Download PDFInfo
- Publication number
- CN114154189A CN114154189A CN202110122269.7A CN202110122269A CN114154189A CN 114154189 A CN114154189 A CN 114154189A CN 202110122269 A CN202110122269 A CN 202110122269A CN 114154189 A CN114154189 A CN 114154189A
- Authority
- CN
- China
- Prior art keywords
- file
- blockchain
- hash
- segment
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a two-segment Hash chain storage certificate method of data or files, wherein the first segment Hash storage calculation process comprises the following steps: hashing the uploaded first file (F1) to obtain a first hash value (H1), and stamping a first time stamp (T1); storing the first hash value (H1) and the first timestamp (T1) simultaneously on a blockchain of the blockchain traceability system; the second segment hash storage calculation process comprises: attaching the first hash value (H1) and the blockchain additional information (Z) to the first file (F1) to obtain a second file (F2); hashing the attached second file (F2) to obtain a second hash value (H2), and stamping a second time stamp (T2); the second hash value (H2) and the second timestamp (T2) are stored simultaneously on the blockchain of the blockchain traceability system. The three-dimensional information of the file, the file hash and the timestamp is stored in the block chain traceability system at the same time, and the problem of data errors in the chain winding process is solved.
Description
Technical Field
The invention belongs to the technical field of a block chain and a computer storage system, and particularly relates to a protocol technology related to a cochain certificate storage system, namely a two-segment Hash cochain certificate storage method for data or files.
Background
A block chain (Blockchain) is a distributed account book system, is commonly maintained by a plurality of nodes, and is characterized by being not easy to tamper, difficult to forge and traceable. The blockchain records all information of the transaction, and once data enters the blockchain, even an internal worker cannot make any change in the blockchain. This unalterable feature comes not from using some kind of operation, but from the block chain system and mechanism itself. This makes the use of block-chaining techniques simpler and more efficient than other security techniques. The blockchain technique can be used in places where fairness, fairness and honesty are needed.
Although the blockchain has a good storage structure and a good security mechanism, the blockchain can be used as a storage certification system, and after the blockchain is linked, data cannot be changed any more, and therefore the blockchain system is often used by people in a source system. However, if the uploaded data or file is changed or is subjected to errors or human malicious tampering during system operation after being uploaded, the data stored in the blockchain may be problematic. It can be known from the problem occurrence process that the problem occurs not after the uplink but before the uplink (for example, uploading wrong data or files), or during the uplink process (for example, an operator makes a mistake or intentionally changes). Legal disputes can arise if the document being deposited is a document having legal effectiveness. The data problem occurring before uplink can be solved by, for example, a predictive engine mechanism.
Traditionally, a document source processing method refers to notarization of an original document at a notarization place. The notarization department can add notarization department seal on the copy of the document to prove that the copy is true after the notarization department checks that the document is true. For example, the original document is a graduation certificate, and after the principal provides the original document to the notarization office, if the graduation certificate is verified by the notarization office to be authentic, a seal is placed on the copied document. The party may apply for work or school based on the stamped copy. The blockchain source system also needs a mechanism similar to this, but the blockchain does not have the function of notarization department (although it can cooperate with the notarization department), so the blockchain cannot check the authenticity of the data or the document, but the blockchain can ensure the following points:
1) original data or words exist and have not been tampered;
2) after a blockchain shows new data or a new file with a blockchain "chapter" (for example, the blockchain signature information and data and file information including hash values, time stamps and/or block information of the data and the file), a user who obtains the new data or the new file can check whether the information is real, and the principle of the check is that after finding the blockchain through the "chapter" on the file, the original information is found through the blockchain.
However, the source is subject to attacks from multiple parties, such as data being altered, data not being saved, data not being signed, and so on. These are problems that have been solved by the blockchain system, but the traditional blockchain chaining method cannot solve the problem of changes of data or files during the uploading process, and in this process, an operator can change files, for example, in the change process of adding blockchain information (hash information and time stamp), the operator can make minor modifications, the provider of the original data or files does not scrutinize or perceive, and a copy of changed data or changed files is stored and fixed in the blockchain system after the uploading process. If the uploader signs this and assumes that it is a genuine version, the original data or document is rendered useless as soon as the tampered version is shaken into a genuine version. Even later in the court, it is very serious that the uploader signature can falsify the authenticity of the data or files stored on the blockchain.
The existing evidence storing method, for example, CN108304710A, discloses an electronic seal signing method based on a block chain and incorporating an identity authentication function, which provides an electronic seal signing service by using the non-tamper property of the block chain, and in the service, a management inquiry chain of the electronic seal is established, and all the operations requiring the terminal are performed on the chain. Uploading electronic files to be stamped to a stamping cloud server through a terminal to wait for stamping, performing hash operation on all multi-party electronic files to be stamped with electronic official stamps to obtain hash values, stamping time stamps, and extracting file summary information, real identity information of a stamping person and longitude and latitude information of the stamping person during stamping; and embedding the hash value, the timestamp, the abstract information of the electronic file with the electronic seal and the information of the seal person into a block chain. The technology provides services of electronic seals, and assumes that an environment, a system and an operator are honest and cannot cheat on stamping and chaining processes, namely, a common seal is stamped by utilizing the non-tampering property of a traditional block chain, so that the document public credibility is improved. Besides, the solutions of electronic chapters of companies such as BYSSTAMP, STAMPD, and Oodles abroad adopt similar methods, i.e. only once chaining. However, this scheme of once-storing the certificate cannot prevent the file from being tampered during the uploading process, and there is no effective solution for the problem of data error occurring during the uplink process.
Disclosure of Invention
The invention provides a two-segment Hash uplink protocol for data or files, which aims to solve the data problem possibly occurring in the uplink process, and is suitable for protecting files with high requirements on file non-tamper property and legal effectiveness, such as lawyer letters, intellectual property books and other files. And the protocol may be used in non-legal applications such as food, medicine, medical, government, energy, finance, etc. The protocol corresponds to a specific two-segment Hash uplink method, a two-segment uplink process is designed by combining files, file Hash and timestamp 3 dimensions and is stored in different blocks respectively, so that an operator is ensured not to make mistakes (whether careless or intentional) in the uplink process, and a user is more relieved of authenticity of the used files.
The invention aims to provide a two-segment Hash chain-up certificate storing method for data or files, which comprises a two-segment Hash storing and calculating process and comprises the following steps:
step 11, performing hash calculation on the uploaded first file (F1) to obtain a first hash value (H1), and stamping a first time stamp (T1);
step 2, the second segment of hash storage calculation process comprises:
step 21, attaching the first hash value (H1) and blockchain attachment information (Z) to the first file (F1) to obtain a second file (F2);
step 22, performing hash calculation on the attached second file (F2) to obtain a second hash value (H2), and stamping a second time stamp (T2);
step 23, storing the second hash value (H2) and the second timestamp (T2) simultaneously on a blockchain of the blockchain traceability system.
Preferably, the three-dimensional information of the file, the file hash and the timestamp is stored in the block chain traceability system at the same time.
Preferably, the step 1 is completed by the blockchain traceability system, or completed by a client using the blockchain traceability system and the blockchain traceability system; in the case that the step 1 is completed by a client using the blockchain and a blockchain system in cooperation, the client uses a mobile phone or a client provided by a computer system to obtain a first hash value of the first file, packages, encrypts and signs the text contained in the first file and the first hash value together to form a data packet, delivers the data packet to a blockchain source system, and after the blockchain source system receives the data packet, opens the data packet and verifies the identity of the first file therein, verifies whether the file and the first hash value are consistent after verifying the identity, stores the first file (H1) and the first timestamp (T1) on the blockchain together if the file and the first hash value are consistent, and refuses to store the first file (H1) and the first timestamp (T1) on the blockchain together if the file and the first hash value are not consistent, and notifies the uploader of the first file (H1).
Preferably, in this intermediate process, the blockchain traceability system further includes another verification process, where the other verification process includes: verifying the authenticity of said first document (H1) at the 3 rd web site or verifying the authenticity of said first document (H1) in cooperation with a notary. These are functions that can be added, all of which can work with the mechanisms of this patent, which covers these scenarios.
Preferably, the application side of the blockchain traceability system can also use an encryption algorithm and/or a signature algorithm on the first file (H1) and the second file (H2).
Preferably, the blockchain additional information (Z) includes blockchain information in the blockchain or identity information of the blockchain in the first segment of hash storage calculation process, and is in the form of an electronic seal or an electronic identity in a blockchain traceability system.
Preferably, the identity information of the blockchain represents the identity card information of the blockchain record source system, and includes blockchain facilitator information, version, time information, and/or approval certification of a notarization department, organization, or unit, where the blockchain facilitator information includes registration information, company name, and/or brand information.
Preferably, the blockchains may be of different kinds or brands, the blockchains using the same or different consensus mechanisms, the blockchains using the same or different databases, encryption algorithms, network protocols and data structures, the blockchains including or not including a predictive agent.
Preferably, the algorithm of the hash calculation is MD5, SHA-1, SHA-2, SHA-256, SHA-512, SHA-3 or RIPEMD-160 algorithm, although other known algorithms may be used as required by those skilled in the art.
Preferably, the method further includes a step of performing auxiliary storage on the blockchain storage, where the auxiliary storage is implemented by using a common database or a big data platform, and in the implementation process of the auxiliary storage, the common database or the big data platform stores hash values and timestamp data corresponding to the first file (F1) and the second file (F2) in the blockchain traceability system in a one-to-one manner.
The invention has the beneficial effects that:
1) preventing inadvertent or malicious alteration of the original data: through the calculation of the original first file (F1), the data in the original file (F1) is guaranteed to be unchanged, and particularly, a client can calculate the hash value of the file first by himself or herself through a mobile phone or a server and then send out the corresponding file, so that the client can verify whether the blockchain traceability system receives the same information through the way whether the blockchain traceability system replies the first file, the hash value of the first file and the first piece of information, that is, the client can simply check in advance through the client.
2) File change prevention for block chain source system
Through the calculation of the second hash value (H2), it is ensured that the file content and data of the first file (F1) are not changed between the request to the upload storage system, and the client can thereby verify that the first file (F1) contained in the second file (F2) is not changed.
3) The public credit of the uplink is determined by the difference between the first time stamp (T1) and the second time stamp (T2).
4) Different from the electronic seal service provided by the prior art, the invention focuses on providing a safer evidence storing mechanism instead of an electronic seal, can use the existing electronic seal method, can also provide other electronic seal methods, or store the electronic seal methods on other block chains, and basically solves the technical problem of preventing any participant from changing related files or data when files are linked through a two-section evidence storing mechanism, namely, storing a source file and a hash value thereof, and storing files and hash values after the electronic seal is added.
5) The system and the operator in the use environment do not need to be honest and cannot be cheated on the stamping and chain linking processes; the method can be implemented under the condition that fraud is possible in the process based on the uplink of the system or operators, and the uplink files and data can not be modified.
6) Different from the prior art that the official seal is added by utilizing the non-tampering property of the traditional block chain, the file public credibility is improved, the adopted two-section uplink storage certificate prevents the cheating situation in the process, wherein the technical effect of the first uplink is the same as the uplink effect of the prior art, and in the second uplink process, the electronic seal is covered on the first uplink information, so that the process is ensured, the file is not tampered, and the process cannot be realized by a one-time uplink mechanism.
The above and other objects, advantages and features of the present invention will become more apparent to those skilled in the art from the following detailed description of specific embodiments thereof, taken in conjunction with the accompanying drawings.
Drawings
Some specific embodiments of the invention will be described in detail hereinafter, by way of illustration and not limitation, with reference to the accompanying drawings. The same reference numbers in the drawings identify the same or similar elements or components. Those skilled in the art will appreciate that the drawings are not necessarily drawn to scale. The objects and features of the present invention will become more apparent in view of the following description taken in conjunction with the accompanying drawings, in which:
fig. 1 is a flowchart of a two-segment hash chain credentialing method for data or files according to an embodiment of the invention.
Detailed Description
In order to make the present invention more comprehensible with respect to its gist, the present invention will be further described with reference to the accompanying drawings and examples. In the following description, numerous specific details and specific examples are set forth in order to provide a more thorough understanding of the present invention and to provide a thorough understanding of the present invention. While this invention is susceptible of embodiment in many different forms than that described herein, there will be many equivalents to those skilled in the art which incorporate such variations and modifications without departing from the spirit and scope of the invention as defined by the appended claims and their equivalents.
The embodiment shown in fig. 1 proposes a two-segment two-block type document link certification protocol, which is suitable for protecting documents with high requirements on document non-tamper property and legal effectiveness, such as lawyer letters, intellectual property books, and the like. And the protocol may be used in non-legal applications such as food, medicine, medical, government, energy, finance, etc. The present embodiment does not limit the type or brand of the blockchain, and the present embodiment covers all cases as long as the blockchain has a consensus mechanism (including using different consensus mechanisms) using different databases, different encryption algorithms, different network protocols, different data structures, and a prediction machine or no prediction machine.
Since the file may contain data, this embodiment discusses that the file represents the data and the file.
The two-segment Hash chain storage certificate method for data or files comprises a two-segment Hash storage calculation process, wherein information of three dimensions of files, file Hash and timestamps is stored in a block chain traceability system at the same time. The method comprises the following steps:
step 11, performing hash calculation on the uploaded first file F1 to obtain a first hash value H1, namely H1= HashF1, and stamping a first timestamp T1;
step 2, the second segment of hash storage calculation process comprises:
step 21, attaching the first hash value H1 and the block chain additional information Z to the first file F1 to obtain a second file F2;
step 22, performing hash calculation on the attached second file F2 to obtain a second hash value H2, that is, H2= HashF2= HashF1+ H1, and stamping a second timestamp T2;
step 23, the second hash value H2 and the second timestamp T2 are simultaneously stored on the blockchain of the blockchain traceability system.
In the middle process, the blockchain traceability system further comprises other verification processes, wherein the other verification processes comprise: the authenticity of the first document H1 is confirmed at the 3 rd web site or the authenticity of the first document H1 is confirmed in cooperation with a notary. These are functions that can be added, all of which can work with the mechanisms of this patent, which covers these scenarios.
The application of the blockchain traceability system may also use an encryption algorithm and/or a signature algorithm for the first file H1 and the second file H2.
The block chain additional information Z includes block information in a block chain or identity information of the block chain in the first segment of hash storage calculation process, and adopts a form of an electronic seal or an electronic identity in a block chain traceability system.
The identity information of the blockchain represents the identity card information of the blockchain source system, and includes blockchain facilitator information, version, time information, and/or approval certification of a notarization department, organization or unit, where the blockchain facilitator information includes registration information, company name, and/or brand information.
The blockchains may be of different kinds or brands, use the same or different consensus mechanisms, use the same or different databases, encryption algorithms, network protocols, and data structures, and include or exclude predictive machines.
The algorithm of the hash calculation is MD5, SHA-1, SHA-2, SHA-256, SHA-512, SHA-3 or RIPEMD-160 algorithm, although other known algorithms may be used as required by those skilled in the art.
The method further comprises the step of performing auxiliary storage aiming at the blockchain storage, wherein the auxiliary storage is implemented by adopting a common database or a big data platform, and in the implementation process of the auxiliary storage, the common database or the big data platform stores hash values and timestamp data which are in one-to-one correspondence with the first file F1 and the second file F2 in the blockchain traceability system respectively; the data table format in the secondary storage is shown in table 1.
TABLE 1 data Table Format in Secondary storage
Serial number | Hash value | | Document | |
1 | H1 | T1 | F1 | |
2 | H2 | T2 | F2 |
After this is done, there are two hash values on the blockchain, one is hash H1 for file F1 and one is hash H2 for F2.
The two-stage mechanism of this embodiment prevents the possible problems that may occur when uploading files or data:
1 prevents inadvertent or malicious alteration of the original data: through the calculation of the original first file F1, it is ensured that the data in the original file (F1) is not changed, and particularly, a client can calculate the hash value of the file first by himself/herself through a mobile phone or a server, and then sends out the corresponding file, so that the client can verify whether the blockchain traceability system receives the same information by means of whether the blockchain traceability system replies the first file, the hash value of the first file, and the first block information, that is, the client can perform simple advance verification by himself/herself.
2 prevent block chain source system from changing files
Through the calculation of the second hash value H2, it is ensured that the file contents and data of the first file F1 are not changed between the request to the upload storage system, and the client can thereby verify that the first file F1 contained in the second file F2 is not changed.
3 the public credit of the uplink is determined by the difference between the first time stamp T1 and the second time stamp T2.
The interval between the two time stamps of the first time stamp T1 and the second time stamp T2 should be short because the second segment storing operation is performed immediately after the first segment storing is completed. The time interval between the first time stamp T1 and the second time stamp T2 is the time consumed by two storage operations. This time is short, but the specifics may depend on the quality of the network communication environment and the performance of the system memory. However, this time interval must be short, e.g. within 3 seconds, anyway. If the time interval between the first time stamp T1 and the second time stamp T2 is long, it is possible to store a case where the file is falsified because there is time consumed for the falsification operation. Therefore, if the first timestamp T1 and the second timestamp T2 differ by more than a predetermined period of time, the uplink will fail this time.
The traditional blockchain tracing operation occurs once in the last chain, after being time-stamped. Many blockchain traceability systems link up only once, such as the IBM Food Trust tool. But many chains of blocks "chapters" are appended after the winding. The problem faced at present is that if the blockchain traceability system only stores one file, it should store the original first file F1 or the stamped second file F2, if the first file F1 is stored, then the second file F2 propagated outside the blockchain traceability system is not correct, since both files F1 and F2 placed in the database can be changed, an attacker can change F1 and F2 on the database together, when the user gets the second file F2 actually having false data and the second file F2 points to the false first file F1, even though the file is determined to be true through query, so that the first file F1 where the true data on the blockchain exists is successfully attacked, and is difficult to find and compare because the file is not directed.
If the second file F2 is stored, the client challenges the blockchain traceability system to not store the first file F1 during the uplink and may have changed data, so as not to accept the second file F2.
Therefore, consider that both files F1 and F2 should be located above the storage block chain source system.
In addition, F2 has not changed the original content in the uplink flow except for "chapter". This is difficult to perceive if the file has a slight amount of change. In legal documents, the characters are many, and the meaning of the legal terms is greatly different as long as a few characters are changed. For example, changing the effective date of 12/1 to 12/11 may have an effect that the event occurs on 12/2 and is not within the validity period of the tampering. The alteration may be due to the time stamping being covered, or may be a mistake by an operator uploading the file, or does not exclude the operator from intentionally tampering. This may upload an incorrect file that has changed to the chain.
The present embodiment avoids the above problems due to the use of a two-segment hash cochain credentialing protocol.
Examples
The user a uploads the credential material F1 to the blockchain client C through the mobile phone APP client, and the blockchain client C calculates the hash value of the credential material F1 through a hash algorithm, that is, H1= HashF1, where the hash algorithm may be an algorithm such as SHA-512 or SHA-384. The blockchain client C puts the hash value H1 calculated by the file F1, the file F1, and the current timestamp T1 into the blocks in the form of a transaction, and broadcasts the established blocks to the respective consensus nodes of the blockchain B.
And after receiving the blocks, verifying the hash values and the time stamps of the transaction file F1, the file F1 in the blocks by all the common identification nodes of the blockchain B, wherein the verification comprises signature verification and file hash verification, and sending the verification results to all the blockchain common identification nodes. Each blockchain consensus node votes after receiving the verification result, and for the transaction passing the vote, the blockchain generates a "certificate Z, and if consistent, the files H1, T1 (time stamps) can be put together into a block. If not, the uplink is rejected and the user A is informed. And simultaneously packaging the file F1, the hash value H1 and the certificate Z to generate a new file F2, voting and consensus are carried out, and the passed transaction is attached to the file F1 to obtain a file F2, namely F2= F1+ H1+ Z. The appended file F2 is then hashed to obtain a new hash value H2, i.e., H2= HashF2= HashF1+ H1, and added to the timestamp T2 memory block chain BC.
When querying the file, client D reads the user's second certified file F2 from the blockchain client. And F2 points to F1, which also contains H1, while F2 and F1 both exist on the blockchain, ensuring that neither file has been tampered, while F2 ensures that F1 has not been tampered.
The user D takes the original file F1 for hashing, and the result is the same as the hash value H1 provided by F2, thus ensuring the consistency of the original file F1.
In addition, user D may also compare timestamp T1 with timestamp T2 to ensure that the file has not been tampered with. The user A can share the two-dimensional code or the link of the storage address of the F2 file, and other users can conveniently view the two-dimensional code or the link.
The disclosure shows F2 files, not F1 files. The reason for this is to protect the originality of the author of the F1 original file. The original file fingerprint is ensured by the hash value H1 of F1, and a person who operates the F1 file later can only modify the original file on the basis of F1 without losing the originality of F1.
While the present invention has been described with reference to the particular illustrative embodiments, it is not to be restricted by the embodiments but only by the appended claims. It will be understood by those skilled in the art that variations and modifications of the embodiments of the present invention can be made without departing from the scope and spirit of the invention.
Claims (10)
1. A two-segment Hash chain link certificate storing method for data or files is characterized in that: the method comprises a two-stage hash storage calculation process, and comprises the following steps:
step 1, a first segment of hash storage calculation process includes:
step 11, performing hash calculation on the uploaded first file (F1) to obtain a first hash value (H1), and stamping a first time stamp (T1);
step 12, storing the first hash value (H1) and the first timestamp (T1) simultaneously on a blockchain of a blockchain traceability system;
step 2, the second segment of hash storage calculation process comprises:
step 21, attaching the first hash value (H1) and blockchain attachment information (Z) to the first file (F1) to obtain a second file (F2);
step 22, performing hash calculation on the attached second file (F2) to obtain a second hash value (H2), and stamping a second time stamp (T2);
step 23, storing the second hash value (H2) and the second timestamp (T2) simultaneously on a blockchain of the blockchain traceability system.
2. The two-segment hash cochain certification method according to claim 1, wherein: and the three-dimensional information of the file, the file hash and the timestamp is stored in the block chain traceability system at the same time.
3. The two-segment hash cochain certification method according to claim 1, wherein: the step 1 is completed by the blockchain traceability system, or completed by a client using the blockchain traceability system and the blockchain traceability system; in the case that the step 1 is completed by a client using the blockchain and a blockchain system in cooperation, the client uses a mobile phone or a client provided by a computer system to obtain a first hash value of the first file, packages, encrypts and signs the text contained in the first file and the first hash value together to form a data packet, delivers the data packet to a blockchain source system, and after the blockchain source system receives the data packet, opens the data packet and verifies the identity of the first file therein, verifies whether the file and the first hash value are consistent after verifying the identity, stores the first file (H1) and the first timestamp (T1) on the blockchain together if the file and the first hash value are consistent, and refuses to store the first file (H1) and the first timestamp (T1) on the blockchain together if the file and the first hash value are not consistent, and notifies the uploader of the first file (H1).
4. The two-segment hash cochain certification method according to claim 3, wherein: in this middle process, the blockchain traceability system further includes other verification processes, including: verifying the authenticity of said first document (H1) at the 3 rd party website or, in cooperation with a notary, verifying the authenticity of said first document (H1);
these are functions that can be added, all of which can work with the mechanisms of this patent, which covers these scenarios.
5. The two-segment hash cochain certification method according to claim 1, wherein: the application side of the blockchain traceability system can also use an encryption algorithm and/or a signature algorithm for the first file (H1) and the second file (H2).
6. The two-segment hash cochain certification method according to claim 1, wherein: the block chain additional information (Z) comprises block information in the block chain or identity information of the block chain in the first segment of hash storage calculation process, and is in the form of an electronic seal or an electronic identity in a block chain traceability system.
7. The two-segment hash cochain certification method according to claim 6, wherein: the identity information of the block chain represents the identity card information of the block chain source system, and includes block chain service provider information, version, time information, and/or approval certification of a notarization department, organization, or unit, where the block chain service provider information includes registration information, company name, and/or brand information.
8. The two-segment hash cochain certification method according to claim 1, wherein: the blockchains may be of different kinds or brands, using the same or different consensus mechanisms, using the same or different databases, encryption algorithms, network protocols and data structures, including or not including a predictive engine.
9. The two-segment hash cochain certification method according to claim 1, wherein: the algorithm of the hash calculation is MD5, SHA-1, SHA-2, SHA-256, SHA-512, SHA-3 or RIPEMD-160 algorithm, although other known algorithms may be used as required by those skilled in the art.
10. The two-segment hash cochain certification method according to claim 1, wherein: the method further comprises a step of performing auxiliary storage on the blockchain storage, wherein the auxiliary storage is implemented by adopting a common database or a big data platform, and in the implementation process of the auxiliary storage, the common database or the big data platform stores hash values and timestamp data which are respectively in one-to-one correspondence with the first file (F1) and the second file (F2) in the blockchain traceability system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110122269.7A CN114154189B (en) | 2021-01-29 | 2021-01-29 | Two-section type Hash chain link evidence storing method for data or files |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110122269.7A CN114154189B (en) | 2021-01-29 | 2021-01-29 | Two-section type Hash chain link evidence storing method for data or files |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114154189A true CN114154189A (en) | 2022-03-08 |
CN114154189B CN114154189B (en) | 2022-06-24 |
Family
ID=80461551
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110122269.7A Active CN114154189B (en) | 2021-01-29 | 2021-01-29 | Two-section type Hash chain link evidence storing method for data or files |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114154189B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109002732A (en) * | 2018-07-17 | 2018-12-14 | 深圳前海微众银行股份有限公司 | Data deposit card method, apparatus and system and data evidence collecting method |
CN109101572A (en) * | 2018-07-17 | 2018-12-28 | 何晓行 | Card method, apparatus and server, storage medium are deposited based on block chain |
CN109409122A (en) * | 2018-09-13 | 2019-03-01 | 远光软件股份有限公司 | File memory method and its electronic equipment, storage medium |
CN109756341A (en) * | 2018-12-05 | 2019-05-14 | 新华三技术有限公司 | Electronic signature method and device |
TWI676385B (en) * | 2018-08-31 | 2019-11-01 | 中華電信股份有限公司 | System of timestamp signature and method for using timestamp signature |
CN111177172A (en) * | 2019-12-31 | 2020-05-19 | 江苏荣泽信息科技股份有限公司 | Electronic deposit certificate system based on block chain |
US20200159696A1 (en) * | 2018-11-16 | 2020-05-21 | Advanced Messaging Technologies, Inc. | Systems and Methods for Distributed Data Storage and Delivery Using Blockchain |
CN111259070A (en) * | 2019-11-28 | 2020-06-09 | 国网山东省电力公司 | Method and related device for storing and acquiring service data |
CN111445238A (en) * | 2020-02-11 | 2020-07-24 | 江苏荣泽信息科技股份有限公司 | Electronic deposit certificate system based on block chain |
-
2021
- 2021-01-29 CN CN202110122269.7A patent/CN114154189B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109002732A (en) * | 2018-07-17 | 2018-12-14 | 深圳前海微众银行股份有限公司 | Data deposit card method, apparatus and system and data evidence collecting method |
CN109101572A (en) * | 2018-07-17 | 2018-12-28 | 何晓行 | Card method, apparatus and server, storage medium are deposited based on block chain |
TWI676385B (en) * | 2018-08-31 | 2019-11-01 | 中華電信股份有限公司 | System of timestamp signature and method for using timestamp signature |
CN109409122A (en) * | 2018-09-13 | 2019-03-01 | 远光软件股份有限公司 | File memory method and its electronic equipment, storage medium |
US20200159696A1 (en) * | 2018-11-16 | 2020-05-21 | Advanced Messaging Technologies, Inc. | Systems and Methods for Distributed Data Storage and Delivery Using Blockchain |
CN109756341A (en) * | 2018-12-05 | 2019-05-14 | 新华三技术有限公司 | Electronic signature method and device |
CN111259070A (en) * | 2019-11-28 | 2020-06-09 | 国网山东省电力公司 | Method and related device for storing and acquiring service data |
CN111177172A (en) * | 2019-12-31 | 2020-05-19 | 江苏荣泽信息科技股份有限公司 | Electronic deposit certificate system based on block chain |
CN111445238A (en) * | 2020-02-11 | 2020-07-24 | 江苏荣泽信息科技股份有限公司 | Electronic deposit certificate system based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN114154189B (en) | 2022-06-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109409122B (en) | File storage method, electronic device and storage medium | |
US10735207B2 (en) | System and method for implementing blockchain-based digital certificates | |
CN110785760B (en) | Method and system for registering digital documents | |
CN110800254B (en) | System and method for generating digital signature | |
US20110231645A1 (en) | System and method to validate and authenticate digital data | |
CN110995673B (en) | Case evidence management method and device based on block chain, terminal and storage medium | |
CN109756341B (en) | Electronic signature method and device | |
CN108092779A (en) | A kind of method and device for realizing electronic signature | |
US20120260098A1 (en) | Storage and Authentication of Data Transactions | |
CN109491965A (en) | The storage method and its network and electronic equipment of purchase sale of electricity contract | |
CN109242404B (en) | Resume information management method, resume information management device, computer equipment and readable storage medium | |
CN111881481A (en) | Block chain-based medical data processing method, device, equipment and storage medium | |
US20080109651A1 (en) | System and methods for digital file management and authentication | |
CN106656511A (en) | Method and system for uniformly managing identity endorsement | |
CN115147975B (en) | Encryption network voting method based on block chain | |
KR20200094956A (en) | Electronic document service platform using block chain | |
US11301823B2 (en) | System and method for electronic deposit and authentication of original electronic information objects | |
CN114626046A (en) | Electronic signature method based on intelligent password key | |
CN113672991A (en) | Public electronic contract contracting method based on block chain technology | |
CN110493011B (en) | Block chain-based certificate issuing management method and device | |
CN114154189B (en) | Two-section type Hash chain link evidence storing method for data or files | |
CN108322311B (en) | Method and device for generating digital certificate | |
Pinkas et al. | Cms advanced electronic signatures (cades) | |
CN110535663B (en) | Method and system for realizing trusted timestamp service based on block chain | |
CN109635594A (en) | Electronics execution of contract and the anti-counterfeit authentication method for signing process again |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |