CN114154189B - Two-section type Hash chain link evidence storing method for data or files - Google Patents

Two-section type Hash chain link evidence storing method for data or files Download PDF

Info

Publication number
CN114154189B
CN114154189B CN202110122269.7A CN202110122269A CN114154189B CN 114154189 B CN114154189 B CN 114154189B CN 202110122269 A CN202110122269 A CN 202110122269A CN 114154189 B CN114154189 B CN 114154189B
Authority
CN
China
Prior art keywords
file
blockchain
hash
data
segment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110122269.7A
Other languages
Chinese (zh)
Other versions
CN114154189A (en
Inventor
蔡维德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianmin Qingdao International Sandbox Research Institute Co ltd
Zeu Crypto Networks Inc
Original Assignee
Tianmin Qingdao International Sandbox Research Institute Co ltd
Zeu Crypto Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianmin Qingdao International Sandbox Research Institute Co ltd, Zeu Crypto Networks Inc filed Critical Tianmin Qingdao International Sandbox Research Institute Co ltd
Priority to CN202110122269.7A priority Critical patent/CN114154189B/en
Publication of CN114154189A publication Critical patent/CN114154189A/en
Application granted granted Critical
Publication of CN114154189B publication Critical patent/CN114154189B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The invention provides a two-segment Hash chain storage certificate method of data or files, wherein the first segment Hash storage calculation process comprises the following steps: hashing the uploaded first file (F1) to obtain a first hash value (H1), and stamping a first time stamp (T1); storing the first hash value (H1) and the first timestamp (T1) simultaneously on a blockchain of the blockchain traceability system; the second segment hash storage calculation process comprises: attaching the first hash value (H1) and the blockchain additional information (Z) to the first file (F1), obtaining a second file (F2); hashing the attached second file (F2) to obtain a second hash value (H2), and stamping a second time stamp (T2); the second hash value (H2) and the second timestamp (T2) are stored simultaneously on the blockchain of the blockchain traceability system. The three-dimensional information of the file, the file hash and the timestamp is stored in the block chain traceability system at the same time, and the problem of data errors in the chain winding process is solved.

Description

Two-section type Hash chain link certificate storing method for data or file
Technical Field
The invention belongs to the technical field of a block chain and a computer storage system, and particularly relates to a protocol technology related to a cochain certificate storage system, namely a two-segment Hash cochain certificate storage method for data or files.
Background
A block chain (Blockchain) is a distributed account book system, is commonly maintained by a plurality of nodes, and is characterized by being not easy to tamper, difficult to forge and traceable. The blockchain records all information of the transaction, and once data enters the blockchain, even an internal worker cannot make any change in the blockchain. This unalterable feature comes not from using some kind of operation, but from the block chain system and mechanism itself. This makes the use of block-chaining techniques simpler and more efficient than other security techniques. The block chain technology can be used in places where justice, fairness and honesty are needed.
Although the blockchain has a good storage structure and a good security mechanism, the blockchain can be used as a storage certification system, and after the blockchain is linked, data cannot be changed any more, and therefore the blockchain system is often used by people in a source system. However, if the uploaded data or file is changed or is subjected to errors or human malicious tampering during system operation after being uploaded, the data stored in the blockchain may be problematic. It can be known from the problem occurrence process that the problem occurs not after the uplink but before the uplink (for example, uploading wrong data or files), or during the uplink process (for example, an operator makes a mistake or intentionally changes). Legal disputes can arise if the document being deposited is a document with legal effectiveness. The data problem occurring before uplink can be solved by, for example, a predictive engine mechanism.
Traditionally, a document source processing method refers to notarization of an original document at a notarization place. The notarization department can add notarization department seal on the copy of the document to prove that the copy is true after the notarization department checks that the document is true. For example, the original document is a graduation certificate, and after the principal provides the original document to the notarization office, if the graduation certificate is verified by the notarization office to be authentic, a seal is placed on the copied document. The party may apply for work or school based on the stamped copy. The blockchain source system also needs a mechanism similar to this, but the blockchain does not have the function of notarization department (although it can cooperate with the notarization department), so the blockchain cannot check the authenticity of the data or the document, but the blockchain can ensure the following points:
1) original data or words exist and have not been tampered;
2) after a blockchain shows new data or a new file with a blockchain "chapter" (for example, the blockchain signature information and data and file information including hash values, time stamps and/or block information of the data and the file), a user who obtains the new data or the new file can check whether the information is real, and the principle of the check is that after finding the blockchain through the "chapter" on the file, the original information is found through the blockchain.
However, the source is subject to attacks from multiple parties, e.g., the data is altered, the data is not preserved, the data is not signed, etc. These are problems that have been solved by the blockchain system, but the traditional blockchain chaining method cannot solve the problem of changes of data or files during the uploading process, and in this process, an operator can change files, for example, in the change process of adding blockchain information (hash information and time stamp), the operator can make minor modifications, the provider of the original data or files does not scrutinize or perceive, and a copy of changed data or changed files is stored and fixed in the blockchain system after the uploading process. If the uploader signs this and assumes that it is a genuine version, the original data or document is rendered useless as soon as the tampered version is shaken into a genuine version. Even later in the court, it is very serious that the uploader signature can falsify the authenticity of data or files stored on the blockchain.
For example, CN108304710A discloses a method for signing an electronic seal based on a block chain and incorporating an identity authentication function, which uses the non-tampable property of the block chain to provide a service for signing an electronic seal, and in the service, a management inquiry chain of the electronic seal is established, and all operations requiring a terminal are performed on the chain. Uploading electronic files to be stamped to a stamping cloud server through a terminal to wait for stamping, performing hash operation on all multi-party electronic files to be stamped with electronic official stamps to obtain hash values, stamping time stamps, and extracting file summary information, real identity information of a stamping person and longitude and latitude information of the stamping person during stamping; and embedding the hash value, the timestamp, the abstract information of the electronic file with the electronic seal and the information of the seal person into a block chain. The technology provides services of electronic seals, and assumes that an environment, a system and an operator are honest and cannot cheat on stamping and chaining processes, namely, a common seal is stamped by utilizing the non-tampering property of a traditional block chain, so that the document public credibility is improved. Besides, the solutions of electronic chapters of companies such as BYSSTAMP, STAMPD, and Oodles abroad adopt similar methods, i.e. only once chaining. However, this scheme of once-storing the certificate cannot prevent the file from being tampered during the uploading process, and there is no effective solution for the problem of data error occurring during the uplink process.
Disclosure of Invention
The invention provides a two-segment Hash uplink protocol for data or files, which aims to solve the data problem possibly occurring in the uplink process, and is suitable for protecting files with high requirements on file non-tamper property and legal effectiveness, such as lawyer letters, intellectual property books and other files. And the protocol may be used in non-legal applications such as food, medicine, medical, government, energy, financial, etc. The protocol corresponds to a specific two-segment Hash uplink method, a two-segment uplink process is designed by combining files, file Hash and timestamp 3 dimensions and is stored in different blocks respectively, so that an operator is ensured not to make mistakes (whether careless or intentional) in the uplink process, and a user is more relieved of authenticity of the used files.
The invention aims to provide a two-segment Hash chain-up certificate storing method for data or files, which comprises a two-segment Hash storing and calculating process and comprises the following steps:
step 1, a first segment of hash storage calculation process includes:
step 11, performing hash calculation on the uploaded first file (F1) to obtain a first hash value (H1), and stamping a first time stamp (T1);
step 12, storing the first hash value (H1) and the first timestamp (T1) simultaneously on a blockchain of a blockchain traceability system;
step 2, the second segment of hash storage calculation process comprises:
step 21, attaching the first hash value (H1) and the blockchain additional information (Z) to the first file (F1) to obtain a second file (F2);
step 22, performing hash calculation on the attached second file (F2) to obtain a second hash value (H2), and stamping a second timestamp (T2);
step 23, storing the second hash value (H2) and the second timestamp (T2) on the blockchain of the blockchain tracing system at the same time.
Preferably, the three-dimensional information of the file, the file hash and the timestamp is stored in the block chain traceability system at the same time.
Preferably, the step 1 is completed by the blockchain traceability system, or completed by a client using the blockchain traceability system and the blockchain traceability system; in the case that the step 1 is completed by a client using the blockchain and a blockchain system in cooperation, the client uses a mobile phone or a client provided by a computer system to obtain a first hash value of the first file, packages, encrypts and signs the text contained in the first file and the first hash value together to form a data packet, delivers the data packet to a blockchain source system, and after the blockchain source system receives the data packet, opens the data packet and verifies the identity of the first file therein, verifies whether the file and the first hash value are consistent after verifying the identity, stores the first file (H1) and the first timestamp (T1) together on the blockchain if the file and the first hash value are consistent, and refuses to store the first file (H1) and the first timestamp (T1) together on the blockchain if the file and the first hash value are not consistent, and notifies the uploader of the first file (H1).
Preferably, in this intermediate process, the blockchain traceability system further includes another verification process, where the other verification process includes: verifying the authenticity of said first document (H1) at the 3 rd web site or verifying the authenticity of said first document (H1) in cooperation with a notary. These are functions that can be added, all of which can work with the mechanisms of this patent, which covers these scenarios.
Preferably, the application side of the blockchain traceability system can also use an encryption algorithm and/or a signature algorithm on the first file (H1) and the second file (H2).
Preferably, the blockchain additional information (Z) includes blockchain information in the blockchain or identity information of the blockchain in the first segment of hash storage calculation process, and is in the form of an electronic seal or an electronic identity in a blockchain traceability system.
Preferably, the identity information of the blockchain represents the identity card information of the blockchain record source system, and includes blockchain facilitator information, version, time information, and/or approval certification of a notarization department, organization, or unit, where the blockchain facilitator information includes registration information, company name, and/or brand information.
Preferably, the blockchains may be of different kinds or brands, the blockchains using the same or different consensus mechanisms, the blockchains using the same or different databases, encryption algorithms, network protocols and data structures, the blockchains including or not including a predictive agent.
Preferably, the algorithm of the hash calculation is MD5, SHA-1, SHA-2, SHA-256, SHA-512, SHA-3 or RIPEMD-160 algorithm, although other known algorithms may be used as required by those skilled in the art.
Preferably, the method further includes a step of performing auxiliary storage on the blockchain storage, where the auxiliary storage is implemented by using a common database or a big data platform, and in the implementation process of the auxiliary storage, the common database or the big data platform stores hash values and timestamp data corresponding to the first file (F1) and the second file (F2) in the blockchain traceability system in a one-to-one manner.
The invention has the beneficial effects that:
1) preventing inadvertent or malicious alteration of the original data: through the calculation of the original first file (F1), the data in the original file (F1) is guaranteed to be unchanged, and particularly, a client can calculate the hash value of the file first by himself or herself through a mobile phone or a server and then send out the corresponding file, so that the client can verify whether the blockchain traceability system receives the same information through the way whether the blockchain traceability system replies the first file, the hash value of the first file and the first piece of information, that is, the client can simply check in advance through the client.
2) File change prevention for block chain source system
Through the calculation of the second hash value (H2), it is ensured that the file content and data of the first file (F1) are not changed between the request to the upload storage system, and the client can thereby verify that the first file (F1) contained in the second file (F2) is not changed.
3) The public credit of the uplink is determined by the difference between the first time stamp (T1) and the second time stamp (T2).
4) Different from the electronic seal service provided by the prior art, the invention focuses on providing a safer evidence storing mechanism instead of an electronic seal, can use the existing electronic seal method, can also provide other electronic seal methods, or store the electronic seal methods on other block chains, and basically solves the technical problem of preventing any participant from changing related files or data when files are linked through a two-section evidence storing mechanism, namely, storing a source file and a hash value thereof, and storing files and hash values after the electronic seal is added.
5) It is not necessary to assume that the system and the operator in the use environment must be honest and not fraud on the stamping and chaining procedures; the method can be implemented under the condition that fraud is possible in the process based on the uplink of the system or operators, and the uplink files and data can not be modified.
6) Different from the prior art that the official seal is added by utilizing the non-tampering property of the traditional block chain, the file public credibility is improved, the adopted two-section uplink storage certificate prevents the cheating situation in the process, wherein the technical effect of the first uplink is the same as the uplink effect of the prior art, and in the second uplink process, the electronic seal is covered on the first uplink information, so that the process is ensured, the file is not tampered, and the process cannot be realized by a one-time uplink mechanism.
The above and other objects, advantages and features of the present invention will become more apparent to those skilled in the art from the following detailed description of specific embodiments thereof, taken in conjunction with the accompanying drawings.
Drawings
Some specific embodiments of the invention will be described in detail hereinafter, by way of illustration and not limitation, with reference to the accompanying drawings. The same reference numbers in the drawings identify the same or similar elements or components. Those skilled in the art will appreciate that the drawings are not necessarily drawn to scale. The objects and features of the present invention will become more apparent in view of the following description taken in conjunction with the accompanying drawings, in which:
fig. 1 is a flowchart of a two-segment hash chain credentialing method for data or files according to an embodiment of the invention.
Detailed Description
In order to make the present invention more comprehensible with respect to its gist, the present invention will be further described with reference to the accompanying drawings and examples. In the following description, numerous specific details and specific examples are set forth in order to provide a more thorough understanding of the present invention and to provide a thorough understanding of the present invention. While this invention is susceptible of embodiment in many different forms than that described herein, there will be many equivalents to those skilled in the art which incorporate such variations and modifications without departing from the spirit and scope of the invention as defined by the appended claims and their equivalents.
The embodiment shown in fig. 1 proposes a two-segment two-block type document link certification protocol, which is suitable for protecting documents with high requirements on document non-tamper property and legal effectiveness, such as lawyer letters, intellectual property books, and the like. And the protocol may be used in non-legal applications such as food, medicine, medical, government, energy, finance, etc. The present embodiment does not limit the type or brand of the blockchain, and the present embodiment covers all cases as long as the blockchain has a consensus mechanism (including using different consensus mechanisms) using different databases, different encryption algorithms, different network protocols, different data structures, and a prediction machine or no prediction machine.
Since the file may contain data, this embodiment discusses that the file represents the data and the file.
The two-segment Hash chain storage certificate method for data or files comprises a two-segment Hash storage calculation process, wherein information of three dimensions of files, file Hash and timestamps is stored in a block chain traceability system at the same time. The method comprises the following steps:
step 1, a first segment of hash storage calculation process includes:
step 11, performing hash calculation on the uploaded first file F1 to obtain a first hash value H1, that is, H1= HashF1, and stamping a first timestamp T1;
step 12, storing the first hash value H1 and the first timestamp T1 on the blockchain of the blockchain traceability system at the same time;
step 2, the second segment of hash storage calculation process comprises:
step 21, attaching the first hash value H1 and the block chain additional information Z to the first file F1 to obtain a second file F2;
step 22, performing hash calculation on the attached second file F2 to obtain a second hash value H2, that is, H2= HashF2= HashF1+ H1, and stamping a second timestamp T2;
step 23, the second hash value H2 and the second timestamp T2 are simultaneously stored on the blockchain of the blockchain traceability system.
Step 1, the operation is completed by the block chain traceability system, or the operation is completed by a client using the block chain traceability system and the block chain traceability system; step 1, under the condition that a client using a blockchain and a blockchain system cooperate, the client obtains a first hash value of a first file by using a mobile phone or a client provided by a computer system, packages, encrypts and signs characters contained in the first file and the first hash value together to form a data packet, delivers the data packet to a blockchain summary source system, opens the data packet and verifies the identity of the first file after the blockchain summary source system receives the data packet, verifies whether the file and the first hash value are consistent or not after the identity is verified, stores the first file H1 and a first timestamp T1 on the blockchain together if the file and the first hash value are consistent, and refuses to store the first file H1 and the first timestamp T1 on the blockchain together and notifies an uploader of the first file H1.
In the middle process, the blockchain traceability system further comprises other verification processes, wherein the other verification processes comprise: the authenticity of the first document H1 is confirmed at the 3 rd web site or the authenticity of the first document H1 is confirmed in cooperation with a notary. These are functions that can be added, all of which can work with the mechanisms of this patent, which covers these scenarios.
The application of the blockchain traceability system may also use an encryption algorithm and/or a signature algorithm for the first file H1 and the second file H2.
The block chain additional information Z includes block information in a block chain or identity information of the block chain in the first segment of hash storage calculation process, and adopts a form of an electronic seal or an electronic identity in a block chain traceability system.
The identity information of the blockchain represents the identity card information of the blockchain source system, and includes blockchain facilitator information, version, time information, and/or approval certification of a notarization department, organization or unit, where the blockchain facilitator information includes registration information, company name, and/or brand information.
The blockchains may be of different kinds or brands, use the same or different consensus mechanisms, use the same or different databases, encryption algorithms, network protocols, and data structures, and include or exclude predictive machines.
The algorithm of the hash calculation is MD5, SHA-1, SHA-2, SHA-256, SHA-512, SHA-3 or RIPEMD-160 algorithm, although other known algorithms may be used as required by those skilled in the art.
The method further comprises the step of performing auxiliary storage aiming at the blockchain storage, wherein the auxiliary storage is implemented by adopting a common database or a big data platform, and in the implementation process of the auxiliary storage, the common database or the big data platform stores hash values and timestamp data which are in one-to-one correspondence with the first file F1 and the second file F2 in the blockchain traceability system respectively; the data table format in the secondary storage is shown in table 1.
TABLE 1 data Table Format in Secondary storage
Serial number Hash value Time stamp Document
1 H1 T1 F1
2 H2 T2 F2
After this operation, there are two hash values on the blockchain, one is hash H1 of file F1 and one is hash H2 of F2.
The two-stage mechanism of this embodiment prevents the possible problems that may occur when uploading files or data:
1 prevents inadvertent or malicious alteration of the original data: through the calculation of the original first file F1, it is ensured that the data in the original file (F1) is not changed, and particularly, a client can calculate the hash value of the file first by himself/herself through a mobile phone or a server, and then sends out the corresponding file, so that the client can verify whether the blockchain traceability system receives the same information by means of whether the blockchain traceability system replies the first file, the hash value of the first file, and the first block information, that is, the client can perform simple advance verification by himself/herself.
2 prevent block chain source system from changing files
Through the calculation of the second hash value H2, it is ensured that the file content and data of the first file F1 are not changed between the time of sending the request to the upload storage system, and the client can also thereby verify that the first file F1 contained in the second file F2 is not changed.
3 the public credit of the uplink is determined by the difference between the first time stamp T1 and the second time stamp T2.
The interval between the two time stamps of the first time stamp T1 and the second time stamp T2 should be short because the second segment storing operation is performed immediately after the first segment storing is completed. The time interval between the first time stamp T1 and the second time stamp T2 is the time consumed by two storage operations. This time is short, but the specifics may depend on the quality of the network communication environment and the performance of the system memory. However, this time interval must be short, e.g. within 3 seconds, anyway. If the time interval between the first time stamp T1 and the second time stamp T2 is long, it is possible to store a case where the file is falsified because there is time consumed for the falsification operation. Therefore, if the first timestamp T1 and the second timestamp T2 differ by more than a predetermined period of time, the uplink will fail this time.
The traditional blockchain tracing operation occurs once in the last chain, after being time-stamped. Many blockchain traceability systems link up only once, such as the IBM Food Trust tool. But many chains of blocks "chapters" are appended after the winding. The problem faced at present is that if the blockchain traceability system only stores one file, it should store the original first file F1 or the stamped second file F2, if the first file F1 is stored, then the second file F2 propagated outside the blockchain traceability system is not correct, since both files F1 and F2 placed in the database can be changed, an attacker can change the F1 and F2 on the database together, when the user gets the second file F2 actually having false data and the second file F2 points to the false first file F1, even though the query is deemed to be true, so that the first file F1 where the true data on the blockchain exists is successfully attacked, and is difficult to find and compare because the file is not directed.
If the second file F2 is stored, the client may challenge the blockchain traceability system to not store the first file F1 and possibly have changed data when it is linked up, and thus not accept the second file F2.
Therefore, consider that both files F1 and F2 should be located above the storage block chain source system.
In addition, F2 has not changed the original content in the uplink flow except for "chapter". This is difficult to perceive if the file has a slight amount of change. In legal documents, the characters are many, and the meaning of the legal terms is greatly different as long as a few characters are changed. For example, changing the effective date of 12/1 to 12/11 may have an effect that the event occurs on 12/2 and is not within the validity period of the tampering. The alteration may be due to the time stamping being covered, or may be a mistake by an operator uploading the file, or does not exclude the operator from intentionally tampering. This may upload an incorrect file that has changed to the chain.
The present embodiment avoids the above problems due to the use of a two-segment hash cochain credentialing protocol.
Examples
The user a uploads the credential material F1 to the blockchain client C through the mobile phone APP client, and the blockchain client C calculates the hash value of the credential material F1 through a hash algorithm, that is, H1= HashF1, where the hash algorithm may be an algorithm such as SHA-512 or SHA-384. The blockchain client C puts the hash value H1 calculated by the file F1 and the file F1 and the current timestamp T1 into the blocks in a transaction form, and broadcasts the established blocks to the respective consensus nodes of the blockchain B.
And after receiving the blocks, verifying the hash values and the time stamps of the transaction file F1, the file F1 in the blocks by all the common identification nodes of the blockchain B, wherein the verification comprises signature verification and file hash verification, and sending the verification results to all the blockchain common identification nodes. Each blockchain consensus node votes after receiving the verification result, and for the transaction passing the vote, the blockchain generates a "certificate Z, and if consistent, the files H1, T1 (time stamps) can be put together into a block. If not, the uplink is rejected and the user A is informed. And packaging the file F1, the hash value H1 and the certificate Z to generate a new file F2, voting and consensus are carried out, and the passed transaction is attached to the file F1 to obtain a file F2, namely F2= F1+ H1+ Z. The appended file F2 is then subjected to hash calculation to obtain a new hash value H2, that is, H2= HashF2= HashF1+ H1, and a timestamp T2 is added to the block chain BC.
When querying the file, client D reads the user's second certified file F2 from the blockchain client. And F2 points to F1, which also contains H1, while F2 and F1 both exist on the blockchain, ensuring that neither file has been tampered, while F2 ensures that F1 has not been tampered.
The user D takes the original file F1 for hashing, and the result is the same as the hash value H1 provided by F2, thus ensuring the consistency of the original file F1.
In addition, user D may also compare timestamp T1 with timestamp T2 to ensure that the file has not been tampered with. The user A can share the two-dimensional code or the link of the storage address of the F2 file, and other users can conveniently view the two-dimensional code or the link.
The disclosure shows F2 files, not F1 files. The reason for this is to protect the originality of the author of the F1 original file. The original file fingerprint is guaranteed through the hash value H1 of F1, and a person who operates the F1 file later can only modify the file on the basis of F1 without losing the originality of F1.
While the present invention has been described with reference to the particular illustrative embodiments, it is not to be restricted by the embodiments but only by the appended claims. It will be understood by those skilled in the art that variations and modifications of the embodiments of the present invention can be made without departing from the scope and spirit of the invention.

Claims (10)

1. A two-segment Hash chain link certificate storing method for data or files is characterized in that: the method comprises a two-stage hash storage calculation process, and comprises the following steps:
step 1, a first segment of hash storage calculation process includes:
step 11, performing hash calculation on the uploaded first file F1 to obtain a first hash value H1, and stamping a first timestamp T1;
step 12, storing the first hash value H1 and the first timestamp T1 on a blockchain of a blockchain traceability system at the same time;
step 2, the second segment of hash storage calculation process comprises:
step 21, attaching the first hash value H1 and the block chain attachment information Z to the first file F1 to obtain a second file F2;
step 22, performing hash calculation on the attached second file F2 to obtain a second hash value H2, and stamping a second timestamp T2;
step 23, storing the second hash value H2 and the second timestamp T2 on the blockchain of the blockchain tracing system at the same time.
2. The two-segment hash cochain certification method according to claim 1, wherein: and the block chain traceability system simultaneously stores information of two dimensions of file hash and timestamp.
3. The two-segment hash cochain certification method according to claim 1, wherein: the step 1 is completed by the blockchain traceability system, or completed by a client using the blockchain traceability system and the blockchain traceability system; in the step 1, when a client using the blockchain and the blockchain system cooperate to complete, the client uses a mobile phone or a client provided by a computer system to obtain a first hash value of the first file, packages, encrypts and signs text included in the first file and the first hash value together to form a data packet, delivers the data packet to a blockchain source system, and after receiving the data packet, opens the data packet and verifies the identity of the first file therein, after verifying the identity, checks whether the file and the first hash value are consistent, if so, stores the first file H1 and the first timestamp T1 together on the blockchain, and if not, refuses to store the first file H1 and the first timestamp T1 together on the blockchain, and notifies the uploader of the first file H1.
4. The two-segment Hash chain crediting method for data or files of claim 3, wherein: in this middle process, the blockchain traceability system further includes other verification processes, including: the authenticity of the first document H1 is confirmed at the 3 rd web site or the authenticity of the first document H1 is confirmed in cooperation with a notary.
5. The two-segment hash cochain certification method according to claim 1, wherein: the application side of the blockchain traceability system can also use an encryption algorithm and/or a signature algorithm for the first file H1 and the second file H2.
6. The two-segment hash cochain certification method according to claim 1, wherein: the block chain additional information Z includes block information in the block chain or identity information of the block chain in the first segment hash storage calculation process, and adopts a form of an electronic seal or an electronic identity in a block chain traceability system.
7. The two-segment Hash chain crediting method for data or files according to claim 6, wherein: the identity information of the block chain represents the identity card information of the block chain source system, and includes block chain service provider information, version, time information, and/or approval certification of a notarization department, organization, or unit, where the block chain service provider information includes registration information, company name, and/or brand information.
8. The two-segment hash chain storage method for data or files of claim 1, wherein: the blockchains may be of different kinds or brands, using the same or different consensus mechanisms, using the same or different databases, encryption algorithms, network protocols and data structures, including or not including a predictive engine.
9. The two-segment hash cochain certification method according to claim 1, wherein: the algorithm of the hash calculation is MD5, SHA-1, SHA-2, SHA-256, SHA-512, SHA-3 or RIPEMD-160 algorithm.
10. The two-segment hash chain storage method for data or files of claim 1, wherein: the method further comprises a step of performing auxiliary storage on the blockchain storage, wherein the auxiliary storage is implemented by adopting a common database or a big data platform, and in the implementation process of the auxiliary storage, the common database or the big data platform stores hash values and timestamp data which are respectively in one-to-one correspondence with the first file F1 and the second file F2 in the blockchain traceability system.
CN202110122269.7A 2021-01-29 2021-01-29 Two-section type Hash chain link evidence storing method for data or files Active CN114154189B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110122269.7A CN114154189B (en) 2021-01-29 2021-01-29 Two-section type Hash chain link evidence storing method for data or files

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110122269.7A CN114154189B (en) 2021-01-29 2021-01-29 Two-section type Hash chain link evidence storing method for data or files

Publications (2)

Publication Number Publication Date
CN114154189A CN114154189A (en) 2022-03-08
CN114154189B true CN114154189B (en) 2022-06-24

Family

ID=80461551

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110122269.7A Active CN114154189B (en) 2021-01-29 2021-01-29 Two-section type Hash chain link evidence storing method for data or files

Country Status (1)

Country Link
CN (1) CN114154189B (en)

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109002732B (en) * 2018-07-17 2022-04-26 深圳前海微众银行股份有限公司 Data evidence storage method, equipment and system and data evidence obtaining method
CN109101572B (en) * 2018-07-17 2021-03-02 何晓行 Block chain based evidence storing method and device, server and storage medium
TWI676385B (en) * 2018-08-31 2019-11-01 中華電信股份有限公司 System of timestamp signature and method for using timestamp signature
CN109409122B (en) * 2018-09-13 2022-08-16 远光软件股份有限公司 File storage method, electronic device and storage medium
US10949388B2 (en) * 2018-11-16 2021-03-16 Advanced Messaging Technologies, Inc. Systems and methods for distributed data storage and delivery using blockchain
CN109756341B (en) * 2018-12-05 2022-03-11 新华三技术有限公司 Electronic signature method and device
CN111259070B (en) * 2019-11-28 2024-04-19 国网山东省电力公司 Method and related device for storing and acquiring service data
CN111177172A (en) * 2019-12-31 2020-05-19 江苏荣泽信息科技股份有限公司 Electronic deposit certificate system based on block chain
CN111445238A (en) * 2020-02-11 2020-07-24 江苏荣泽信息科技股份有限公司 Electronic deposit certificate system based on block chain

Also Published As

Publication number Publication date
CN114154189A (en) 2022-03-08

Similar Documents

Publication Publication Date Title
CN109409122B (en) File storage method, electronic device and storage medium
US10735207B2 (en) System and method for implementing blockchain-based digital certificates
CN110785760B (en) Method and system for registering digital documents
CN110800254B (en) System and method for generating digital signature
US20110231645A1 (en) System and method to validate and authenticate digital data
US6401206B1 (en) Method and apparatus for binding electronic impressions made by digital identities to documents
CN110995673B (en) Case evidence management method and device based on block chain, terminal and storage medium
CN108092779A (en) A kind of method and device for realizing electronic signature
CZ78798A3 (en) System and method of proving authenticity of documents
CN111881481A (en) Block chain-based medical data processing method, device, equipment and storage medium
CN110597864A (en) Block chain-based personal information management method and device
KR20200094956A (en) Electronic document service platform using block chain
US10735204B2 (en) System and method for generating digital marks
US11301823B2 (en) System and method for electronic deposit and authentication of original electronic information objects
CN113452526A (en) Electronic document storage and verification method and corresponding device
CN114626046A (en) Electronic signature method based on intelligent password key
CN113672991A (en) Public electronic contract contracting method based on block chain technology
CN113761578A (en) Document true checking method based on block chain
CN110493011B (en) Block chain-based certificate issuing management method and device
CN114154189B (en) Two-section type Hash chain link evidence storing method for data or files
CN115147975B (en) Encryption network voting method based on block chain
CN110535663B (en) Method and system for realizing trusted timestamp service based on block chain
CN114565485A (en) Labor contract management method and system based on block chain ipfs storage
CN109635594A (en) Electronics execution of contract and the anti-counterfeit authentication method for signing process again
CN111414629B (en) Electronic contract signing device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant