CN116467742A - Block chain-based method and device for obtaining and storing certificate - Google Patents

Block chain-based method and device for obtaining and storing certificate Download PDF

Info

Publication number
CN116467742A
CN116467742A CN202310365462.2A CN202310365462A CN116467742A CN 116467742 A CN116467742 A CN 116467742A CN 202310365462 A CN202310365462 A CN 202310365462A CN 116467742 A CN116467742 A CN 116467742A
Authority
CN
China
Prior art keywords
forensic
transaction
certification
request
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310365462.2A
Other languages
Chinese (zh)
Inventor
陈赛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ant Blockchain Technology Shanghai Co Ltd
Original Assignee
Ant Blockchain Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ant Blockchain Technology Shanghai Co Ltd filed Critical Ant Blockchain Technology Shanghai Co Ltd
Priority to CN202310365462.2A priority Critical patent/CN116467742A/en
Publication of CN116467742A publication Critical patent/CN116467742A/en
Pending legal-status Critical Current

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present disclosure provides a blockchain-based method and apparatus for obtaining and depositing a certificate, where the blockchain is deployed with a first smart contract, and the first smart contract is used to authorize the authority of a depositing transaction to a non-depositing user, and the method includes: receiving a first request from a forensic platform, wherein the first request is initiated by a forensic user or a non-forensic user through the forensic platform, and the first request is used for requesting forensic content of the forensic transaction and/or requesting forensic evidence of the forensic transaction; in response to the first request, the blockchain obtains forensic content of the forensic transaction and/or generates a forensic proof of the forensic transaction based on the forensic content of the forensic transaction.

Description

Block chain-based method and device for obtaining and storing certificate
Technical Field
The disclosure relates to the technical field of blockchains, in particular to a blockchain-based acquisition and certification method and device.
Background
Currently, users typically upload certificates to the blockchain based on the trusted nature of the blockchain. In some cases, such as when a dispute occurs, it is desirable to provide the chain of forensic content to non-forensic users, such as judicial authorities, to generate forensic certificates (or referred to as vouchers). However, common certification certificates may be created by pulling the certification content on the chain and then generating the certification certificate under the chain, with the potential for tampering with the certification content. In addition, non-certification users cannot autonomously verify and obtain trusted certification certificates.
Disclosure of Invention
In view of the foregoing, embodiments of the present disclosure are directed to providing a blockchain-based acquisition and certification method and apparatus. Various aspects of the disclosure are presented below.
In a first aspect, a method for obtaining a forensic transaction based on a blockchain deployed with a first smart contract for authorizing rights of the forensic transaction to non-forensic users is provided, the method comprising: receiving a first request from a forensic platform, wherein the first request is initiated by a forensic user or a non-forensic user through the forensic platform, and the first request is used for requesting forensic content of the forensic transaction and/or requesting forensic evidence of the forensic transaction; in response to the first request, the blockchain obtains forensic content of the forensic transaction and/or generates a forensic proof of the forensic transaction based on the forensic content of the forensic transaction.
In a second aspect, there is provided a blockchain-based method of obtaining a forensic document, the method being applied to a forensic platform, the method comprising: receiving a query sent by a user or a certification generation request, wherein the query request is used for requesting to query certification content of a certification transaction, and the certification generation request is used for requesting to generate certification of the certification transaction; and sending a first request to the blockchain to request the blockchain to inquire the certification content of the certification transaction or request the blockchain to generate the certification of the certification transaction.
In a third aspect, an apparatus for obtaining a forensic transaction based on a blockchain deployed with a first smart contract for authorizing rights of the forensic transaction to non-forensic users is provided, the apparatus comprising: the first receiving module is used for receiving a first request from the evidence storage platform, wherein the first request is initiated by an evidence storage user or the non-evidence storage user through the evidence storage platform, and the first request is used for requesting the evidence storage content of the evidence storage transaction and/or requesting the evidence storage evidence of the evidence storage transaction; and the processing module is used for responding to the first request, acquiring the certification content of the certification transaction by the blockchain, and/or generating the certification of the certification transaction based on the certification content of the certification transaction.
In a fourth aspect, there is provided a blockchain-based apparatus for acquiring a forensic document, the apparatus being applied to a forensic platform, the apparatus comprising: the first receiving module is used for receiving a query sent by a user or generating a certification request, wherein the query request is used for requesting to query certification content of a certification transaction, and the certification request is used for requesting to generate certification of the certification transaction; and the first sending module is used for sending a first request to the blockchain to request the blockchain to inquire the certification content of the certification transaction or request the blockchain to generate the certification of the certification transaction.
In a fifth aspect, there is provided a blockchain-based device for forensic acquisition, the device comprising a memory having executable code stored therein and a processor configured to execute the executable code to implement the method of the first or second aspect.
In a sixth aspect, there is provided a computer program product comprising: computer program code which, when run on a computer, causes the computer to perform the method of the above aspects.
In a seventh aspect, there is provided a computer readable medium storing program code which, when run on a computer, causes the computer to perform the method of the above aspects.
The authority of the evidence-storing transaction is authorized to the non-evidence-storing user, so that the non-evidence-storing user can inquire the evidence-storing content of the evidence-storing transaction from the blockchain and/or generate the evidence-storing evidence of the evidence-storing transaction, the non-evidence-storing user can independently verify the evidence-storing content and generate the evidence-storing evidence, the processing difficulty of disputes related to the evidence-storing transaction is reduced, and the problem that the evidence-storing evidence is tampered is avoided.
Drawings
FIG. 1 is a schematic diagram of a system architecture of a blockchain to which the present disclosure is applicable.
Fig. 2 is a schematic flow chart of a blockchain-based method of acquiring a forensic certificate provided in an embodiment of the present disclosure.
Fig. 3 is a schematic flow chart of a blockchain-based method of acquiring a forensic certificate provided in another embodiment of the present disclosure.
Fig. 4 is a schematic diagram of a blockchain-based device for acquiring a certificate in accordance with an embodiment of the present disclosure.
Fig. 5 is a schematic diagram of a blockchain-based acquisition and certification device according to another embodiment of the present disclosure.
Fig. 6 is a schematic diagram of a blockchain-based acquisition and certification device according to yet another embodiment of the present disclosure.
Detailed Description
The following description of the technical solutions in the embodiments of the present disclosure will be made clearly and completely with reference to the accompanying drawings in the embodiments of the present disclosure, and it is apparent that the described embodiments are only some embodiments of the present disclosure, not all embodiments.
Block chain (Blockchain)
Referring to FIG. 1, a blockchain 100 is a typical distributed collaboration system. The system includes a plurality of blockchain nodes 110. The plurality of blockchain nodes 110 may collectively maintain an ever-increasing distributed data record. The recorded data can protect content and timing through cryptographic techniques, making it difficult for any party to tamper with, repudiate, and counterfeite. The blockchain node 110 may be a device with computing capabilities, e.g., a server group, a blockchain chip, etc., wherein the server group may be centralized or distributed. In other implementations, the server may also be a server that provides services for the cloud platform.
In a blockchain, data (e.g., transaction information, transaction execution results, etc.) may be packaged in the form of blocks (blocks). The blocks may be linked to each other by forward references to form a "chain," i.e., a blockchain. In general, the first block in the blockchain may be referred to as the "start block" or "initial block," a block in the blockchain that precedes the current block is referred to as the "last block," and a block in the blockchain that follows the current block is referred to as the "subsequent block.
In general, a block may include a block header and a block body. The block header may contain basic information of the current block to ensure that the current block can enter the blockchain correctly. For example, the block header may record a block hash value of a block previous to the current block. For another example, the block header may also record the block height of the current block. The block height is simply "block high" and is used to identify the location of a block in the blockchain. In some implementations, the block height of the starting block is 0. The zone blocks may be used to record transaction information. The transaction information may include, for example, information such as transaction quantity and transaction data.
Blockchains are generally divided into three types: public chains (Public Blockchain), private chains (Private Blockchain) and federated chains (Consortium Blockchain). In addition, there may be combinations of the above types, such as private chain+federation chain, federation chain+public chain, and the like. Embodiments provided by the present disclosure can be implemented in a suitable type of blockchain.
Taking the application of blockchains to the trusted forensic field as an example, with continued reference to fig. 1, the user 130 may interact with the forensic platform 120 to store forensic data in the forensic platform 120. Currently, to further increase the reliability of the forensics, forensics platform 120 may uplink forensics data submitted by user, i.e., forensics data submitted by user 130, in blockchain 100.
In some scenarios, the user may also act as a user of the blockchain, directly downloading the already-uploaded forensic data from the blockchain. Of course, the user may also interact with the blockchain through the certification platform, which is not limited by the embodiments of the present disclosure.
Consensus mechanism
A consensus mechanism can be understood as how a consensus is reached between the nodes in the blockchain responsible for accounting (or accounting nodes) to identify the validity of a record.
The block chain consensus mechanism has the characteristics of 'minority compliance majority' and 'people equal', wherein 'minority compliance majority' does not completely refer to the number of nodes, but can also refer to the computing power, the share weight or other characteristic quantities which can be compared by a computer. The term "people equal" means that when the nodes meet the condition, all nodes have the right to preferentially present the consensus result, are directly recognized by other nodes and finally possibly become the final consensus result. Taking the example of a proof of work, it is only possible to forge an absent record if more than 51% of the accounting nodes of the whole network are controlled. When there are enough nodes to join the blockchain, this is essentially impossible, thus eliminating the possibility of counterfeits.
The self-trust of the blockchain is mainly embodied in that users distributed in the blockchain do not need to trust the other party of the transaction, do not need to trust any centralized mechanism, and can realize the transaction only by trust of a software system under the blockchain protocol. The precondition of the self-trust is a common mechanism of the blockchain, namely, in a mutually-untrusted market, a sufficient requirement for enabling all nodes to agree is that each node spontaneously and honest obeys the preset rules in the protocol for the consideration of maximizing the benefit of the node, judges the authenticity of each record, and finally records judged to be true into the blockchain. In other words, if the nodes have independent interests and compete with each other, the nodes are less likely to collude into deception, which is particularly apparent when the nodes have a common reputation in the network. The blockchain technology is to use a set of mathematical algorithm based on consensus to build a trust network between machines, so that brand new credit creation is performed through technical endorsements rather than centralized credit institutions.
The mechanism of consensus of the blockchain may be, for example, one of the following mechanisms: a Proof Of Work (PoW), a equity Proof mechanism, a share authorization Proof mechanism, a verification pool mechanism, and a utility barthology fault tolerance (Practical Byzantine Fault Tolerance, PBFT).
Intelligent contract
Smart Contract (Smart contact) is a computer protocol that aims to propagate, verify or execute contracts in an informative manner. The smart contract allows trusted transactions to be conducted without a third party. These transactions are traceable and irreversible.
The advent of blockchains provides technical support for the implementation of smart contracts. The intelligent contracts are written into the blockchain in a digital mode, and the storage, reading and execution of the intelligent contracts are transparent, trackable and unchangeable through the characteristics of the blockchain technology. On the other hand, a set of state machine systems can be built by the self-contained consensus algorithm of the blockchain, so that the intelligent contracts can run efficiently.
In some implementations, a user may invoke a smart contract by submitting a transaction to the blockchain system, and set data recorded in the smart contract, and store the set smart contract in the blockchain. Accordingly, when a specific condition of the intelligent contract is triggered, the blockchain node may execute the intelligent contract and record an execution result of the intelligent contract, and an execution state of the intelligent contract.
Currently, various industries, or even some fields in the industry (e.g., finance, public welfare, insurance, cross-border payment, etc.), build different types of blockchains according to their own industry structures, and record information and assets valuable in the industry or industry on the blockchains.
Trusted memory card
As described above, based on the characteristics of non-tamper-proof, high credibility and the like of the blockchain, the method is widely applied to the field of credible certificate, and can provide credible certificate services. To facilitate an understanding of trusted certificates, the following description is presented in connection with several specific industries (or scenarios).
For the digital work registration scene, the internet age information is fast in propagation and wide in scope, and under the condition that the digital works are not registered in advance, the probability of being infringed is high, and the right maintenance cost is high. In this regard, the blockchain trusted forensic service may provide ownership registration services for digital works, including pictures, video, audio, text, codes, etc., that allow the original work to quickly generate judicially approved electronic data forensic certificates, protecting the copyrights of the digital work.
For service-aware forensic scenarios, a great deal of disputes in the internet service industry are whether platforms and merchants explicitly inform users in advance of service constraints, including constraints, usage ranges, service agreements, privacy protection terms, and the like. In this regard, the blockchain trusted forensic service may provide a trusted timestamp, fair and neutral, judicially approved service to be known to the forensic service, helping the platform, merchant and user maintain their own legal equity.
For the electronic certificate scene, the digital certificates such as electronic certificates, transaction certificates, electronic contracts, electronic bills and the like have the defects of difficult management, easy loss, difficult circulation, difficult verification and the like. In this way, the trusted certification service of the blockchain can provide permanent certification and verification service for the electronic certificates of the users, thereby not only facilitating the users to manage the electronic certificates, but also facilitating the circulation of the electronic certificates of the users.
For the online transaction evidence scene, a great amount of detail data exists in online shopping and transaction behaviors, the data are easy to lose along with the time, and the data are difficult to concatenate when disputes occur. In this regard, the blockchain trusted forensic service may provide a fair, objective, judicially approved forensic service for online transactions by users and a double insurance for online data behavior by users.
For infringement maintenance evidence scene, when legal rights and interests of the user are infringed, the trusted evidence-preserving service of the blockchain can provide evidence-preserving service of infringement evidence for the user, such as service clauses, service contents, transaction prices, customer service communication records and the like of infringement websites, so that the evidence-preserving capability of the user in the process of maintaining rights and interests is ensured.
In some cases, it may be desirable to provide the forensic content of the chain forensic transaction to a non-forensic user to generate a forensic proof. The certification transaction may refer to an instance in the blockchain, and the certification content of the certification transaction may refer to certification content stored in the instance. However, common certification is basically by pulling the certification content on the chain and then generating a certification certificate under the chain, where there is a possibility that the certification content is tampered with. In addition, non-certification users cannot autonomously verify and obtain trusted certification certificates.
For example, when legal disputes such as infringement and transaction problems occur, the depositor needs to provide a depositor with a depositor proof to the judicial authority as evidence for handling the dispute. However, as described above, the evidence proves that there is a possibility of tampering, and at the same time, the judicial authorities cannot autonomously verify and obtain a trusted certificate depending on the evidence provided by the witness, increasing the difficulty of dispute resolution.
According to the embodiment of the disclosure, the intelligent contract is arranged in the blockchain, and the authority of the evidence-storing transaction can be authorized to the non-evidence-storing user based on the intelligent contract, so that the non-evidence-storing user can acquire the evidence-storing content of the evidence-storing transaction or generate the evidence-storing evidence of the evidence-storing transaction, the non-evidence-storing user can autonomously verify the authenticity of the evidence-storing evidence by acquiring the evidence-storing content of the evidence-storing transaction, and meanwhile, the non-evidence-storing user can avoid tampering of the evidence-storing content by autonomously acquiring the evidence-storing evidence of the evidence-storing transaction.
The blockchain-based method of obtaining a forensic certificate of an embodiment of the present disclosure is described below in conjunction with fig. 2. The method shown in FIG. 2 may be performed by a blockchain, for example, by one or more nodes in the blockchain.
The blockchain may be deployed with a first smart contract that may be used to authorize the rights of the forensic transaction to non-forensic users. The certification user can be a personal user or an enterprise user.
Referring to fig. 2, the method shown in fig. 2 may include step S210 and step S220.
In step S210, a first request is received from a certification platform.
The first request may be initiated by a forensic user or a non-forensic user via a forensic platform. The non-authenticated user referred to herein may be a non-authenticated user who obtains authorization for the authority of the authenticated transaction, that is, the non-authenticated user who obtains authorization for the authenticated transaction may also initiate the first request to the blockchain. The rights of the non-licensed user can be acquired by calling the first intelligent contract.
The first request may be for requesting forensic content of the forensic transaction and/or requesting forensic proof of the forensic transaction. In some cases, a non-licensed user needs to query the licensed content of the licensed transaction. For example, a non-authenticated user may verify the authenticity of an authenticated credential provided by the authenticated user by querying the blockchain for the credential content of the authenticated transaction. For another example, when a dispute occurs with respect to a certification transaction, a non-certification party or third party authority may resolve the dispute by querying the certification content of the certification transaction in the blockchain. In other cases, non-authenticated users need to autonomously generate credentials for the credentials transaction. For example, when a legal dispute occurs in connection with a certification transaction, a judicial authority needs to autonomously generate a certification proof of the certification transaction as legal evidence.
As one implementation, the rights of the forensic transaction may correspond to the needs of the non-forensic user, e.g., the rights of the forensic transaction may be divided into a query right and a generation right of the forensic certificate.
In step S220, in response to the first request, the blockchain obtains forensic content of the forensic transaction and/or generates a forensic proof of the forensic transaction based on the forensic content of the forensic transaction.
If the first request is for forensic content of a request forensic transaction, in response to the first request, the blockchain may query forensic content associated with the forensic transaction; if the first request is for a forensic proof of a request forensic transaction, in response to the first request, the blockchain may first query forensic content associated with the forensic transaction and then generate the forensic proof of the forensic transaction based on the query result of the forensic content.
In actual use, in response to a first request, the blockchain may invoke a first smart contract to verify the service rights of the initiating user of the first request. If the initiating user of the first request has the service authority of the evidence-preserving transaction, the blockchain can acquire the evidence-preserving content of the evidence-preserving transaction and/or generate the evidence-preserving evidence of the evidence-preserving transaction based on the evidence-preserving content of the evidence-preserving transaction.
In some implementations, the blockchain may send the acquired forensic content or the generated forensic proof to the user via the forensic platform, which may be the user initiating the first request as previously mentioned.
It should be noted that the non-authenticated user mentioned in this disclosure may be other users than the authenticated user of the authenticated transaction.
The authority of the evidence-storing transaction is authorized to the non-evidence-storing user, so that the non-evidence-storing user can inquire the evidence-storing content of the evidence-storing transaction from the blockchain and/or generate the evidence-storing evidence of the evidence-storing transaction, the non-evidence-storing user can independently verify the evidence-storing content and generate the evidence-storing evidence, the processing difficulty of disputes related to the evidence-storing transaction is reduced, and the problem that the evidence-storing evidence is tampered is avoided.
In some implementations, a user may interact with the forensic platform to obtain forensic data from the blockchain that has been uploaded. That is, the method shown in fig. 2 may further include step S230 before step S210.
In step S230, the user sends a request for acquiring a certificate to the certificate authority.
The obtaining of the forensic request may include a query request, which may be used to request a query of the forensic content of the forensic transaction, and a generating of the forensic request, which may be used to request a generation of the forensic proof of the forensic transaction.
When the certification platform receives a certification obtaining request sent by a user, the certification platform sends a first request to the blockchain to request the blockchain to inquire certification content of a certification transaction or request the blockchain to generate certification of the certification transaction.
The user referred to herein may be a forementioned forensic user or a non-forensic user who obtains authorization for the rights of the forensic transaction.
As previously described, the forensic user may grant the non-forensic user rights to the forensic transaction so that the non-forensic user may query the forensic data in the blockchain and/or generate the forensic proof.
As one implementation, the blockchain may also receive a second request from the forensic platform, which may be used to request that the rights of the forensic transaction be granted to a non-forensic user. For example, the inquiry rights of the forensic transaction may be authorized to the non-forensic user, or the rights of the forensic transaction to generate the forensic certificate may be authorized to the non-forensic user. For another example, both the query rights of the forensic transaction and the rights of the forensic transaction to generate the forensic certificate may be authorized to non-forensic users.
In response to the second request, the blockchain may complete authorization of the rights of the forensic transaction by invoking the first smart contract. In actual use, the authorization relationship of the authenticated user (authorizer) and the non-authenticated user (i.e., the authorizer) may be stored in the first smart contract, or the authorization relationship of the authenticated transaction, authorizer, and authorizer may be stored in the first smart contract. As one example, the forensic hash value of the authorizer, and the authorized forensic transaction may be stored in the first smart contract. Further, in the authorization relationship, the authority of the licensed transaction that can be acquired by the non-licensed user may also be stored in the first smart contract.
To avoid storing invalid data in the blockchain, the relevant information in the authorization relationship may be pre-checked before the authorization relationship is stored in the first smart contract. For example, it may be checked whether an account of an authorized person exists in the chain, or whether the forensic transaction completes forensic to ensure that the authorization relationship is truly valid.
If the result of the pre-verification is acceptable, that is, the account of the authorized person (non-authenticated user) is present on the chain and/or the authenticated transaction has completed the authentication, the blockchain may store the authorization relationship of the rights of the non-authenticated user, the authenticated transaction in the first smart contract.
According to the embodiment of the disclosure, the first intelligent contract is deployed on the blockchain, so that the authority of the evidence-storing content for acquiring the evidence-storing transaction can be authorized to the non-evidence-storing user, the non-evidence-storing user can acquire the evidence-storing content of the evidence-storing transaction in the blockchain, and the problem of unauthorized access of the evidence-storing data is solved.
The authorization relationship stored in the first smart contract may also be used for verification of the service rights of the originating user of the first request as mentioned earlier. If the user is a non-licensed user, it is possible to determine whether the non-licensed user has service rights, that is, whether the non-licensed user is an authorized person, by querying the authorization relationship stored in the first smart contract. Further, whether the non-licensed user is an authorized person of the licensed transaction associated with the first request may be determined by querying an authorization relationship stored in the first smart contract, or whether the service rights of the non-licensed user in the first smart contract are consistent with the service requested by the first request may be determined by querying the first smart contract.
According to the embodiment of the disclosure, the service authority of the user accessing the stored-certificate data in the blockchain is checked, so that the security of the stored-certificate data of the user is ensured.
In some implementations, the user may interact with the forensic platform to authorize the rights of the forensic transaction to non-forensic users. That is, before step S230, the method shown in fig. 2 may further include step S240 (not shown in the drawing).
In step S240, the user sends an authorization request to the certification platform.
The authorization request may be used to authorize the rights of the forensic transaction to a non-forensic user.
After the certification platform receives the authorization request sent by the user, a second request may be sent to the blockchain to request the blockchain to store an authorization relationship corresponding to the authorization request, where the authorization relationship may include rights of the non-certification user and the certification transaction.
The certification Phase (also known as "Phase"), a certification transaction may include one or more certification phases, each of which may include certification content, that is, one example may include certification content in one or more certification phases. In practical use, it is generally necessary to provide certification contents of multiple stages of a certification transaction, if a certification is generated for each certification stage or each certification content, since each certification is single-point and has no association, a complete evidence chain cannot be formed, and the difficulty of evidence collection during dispute resolution is increased.
Therefore, in the embodiment of the disclosure, based on the evidence-storing contents of a plurality of evidence-storing stages of one evidence-storing transaction, the whole-flow evidence-storing evidence of the evidence-storing transaction is generated, that is, the evidence-storing contents of all stages of the evidence-storing transaction can be included in the whole-flow evidence-storing evidence, so that the difficulty of evidence collection during dispute resolution is reduced, and the difficulty of dispute resolution is further reduced.
As one implementation, in response to the first request, the blockchain may query the forensic content of each of the plurality of phases of the forensic transaction, and the blockchain may also generate a full-flow forensic proof of the forensic transaction based on the forensic content of each of the plurality of phases of the forensic transaction.
The multiple phases (i.e., full-flow) of the forensic transaction described above can be implemented by a second smart contract. If the first request is for requesting generation of a forensic proof of the forensic transaction, the blockchain may invoke a second intelligent contract, obtain forensic content for each of a plurality of phases of the forensic transaction, and generate a full-flow forensic proof of the forensic transaction based on the obtaining of the forensic content.
In some embodiments, the forensic content of each of the multiple phases of the same forensic transaction is typically stored under the same instance directory in the blockchain, so that the blockchain may obtain the forensic content of each phase of the forensic transaction through the storage location of the instance. In other embodiments, the same authenticated transaction typically corresponds to the same Token (Token), so that the blockchain may obtain the authenticated contents of each phase of the authenticated transaction through the Token of the authenticated transaction.
As one implementation, a full-flow forensic template may be obtained, and then a full-flow forensic proof of the forensic transaction may be generated based on the full-flow forensic template and the query results of the forensic content. In one aspect, a full-flow forensic template may be used for verification of the forensic content. For example, the full-flow certification verification template may verify the integrity and normalization of the certification content. As an example, the check content may include whether the certification field is satisfactory or whether the certification content is complete at various stages of the certification transaction. In order to enhance the readability of the evidence, reduce the difficulty of dispute resolution, the whole-flow evidence-preserving template can also verify the logical relationship and time sequence of the evidence-preserving contents of a plurality of stages. On the other hand, the full-flow proof of evidence template can also be used for the assembly of the proof content. For example, based on the verification results, the certification contents of the multiple stages may be assembled in a logical relationship or time sequence to form a full-flow certification.
In the embodiment of the disclosure, based on the full-flow evidence-storing and proving template, the proving contents of all stages can be filled into the proving template, so that multiple evidence-storing contents are presented in a full-flow evidence-storing mode, a complete evidence chain with a front-back sequence and a logic relationship is formed, all evidence-storing evidence associated with the evidence-storing transaction can be obtained at one time, and the evidence collection difficulty in dispute resolution situations is reduced.
It should be noted that the first smart contract and the second smart contract mentioned above may be created by the certification platform and applied for deployment on the blockchain.
For ease of understanding, the blockchain-based acquisition and certification method of embodiments of the present disclosure will be described below with reference to fig. 3, taking a full-flow certification of an acquisition and certification transaction as an example.
Referring to fig. 3, the method 300 may include steps S302 to S336.
Step S302 and step S304 may be the deployment flow of the full-flow proof-of-document smart contract. The full-flow proof-of-existence smart contract may be the second smart contract mentioned previously.
In step S302, a full-flow proof-of-possession smart contract is created.
The full-flow certificate authority contract may be created by a certificate authority. The full-flow forensic intelligent contract may include a full-flow forensic proof template in which verification of forensic content and assembly of forensic content may be used.
As one implementation, a full-flow certification intelligent contract may be used to query multi-stage certification content of a certification transaction and generate a full-flow certification based on the certification template.
In step S304, a full-flow certificate authority contract is deployed.
The full-flow certificate authority contract created in step S302 is deployed on the blockchain. For example, the certification platform may send a deployment application and a full-flow certification smart contract to the blockchain to deploy the smart contract on the blockchain.
Step S312 and step S314 may authorize the deployment flow of the smart contract for the certification. The forensic authorized smart contract may be the first smart contract mentioned previously.
In step S312, a forensic authorized smart contract is created.
The forensic authority smart contract may be created by a forensic platform. The forensic authorization smart contract may include stored content and a manner of storage of the authorization relationship. For example, the stored content may include an authorized person (non-depository) and a depository transaction, and the stored content may also include an authorized person (depository). For another example, the storage mode may be direct storage or indirect storage. As one example, the stored version of the forensic transaction may be a forensic content hash value.
As one implementation, the forensic authorization smart contract may be used to store the authorizer, and the forensic hash value of the authorization. According to the stored authorization relationship in the certificate-storing authorization intelligent contract, the authorized person can be checked in the certificate applying process.
In step S314, a forensic authorized smart contract is deployed.
The certification authority smart contract created in step S312 is deployed on the blockchain. For example, the certification platform may send a deployment application to the blockchain and certification authority smart contracts to deploy the smart contracts on the blockchain.
Steps S322 to S326 may be an authorization process for generating a certificate of authenticity.
In step S322, an authorization request to generate a certificate of authenticity is initiated.
The authorization request for the forensic certificate may be initiated by a user, who may be a forensic user of the forensic certificate.
In step S324, a preamble check is performed.
When the certification platform receives a certification authority request of a user, the certification platform can perform pre-verification first. For example, the pre-verification may include whether the validation has completed verification and whether an authorized person account exists on the chain, and so on.
As one implementation, the forensic platform may send a forensic request to the blockchain, and the blockchain may return information such as whether the forensic is complete, whether the authorized person account exists, etc. to the forensic platform to complete the forensic.
In step S326, the authorization relationship is stored.
If the pre-verification result in step S324 is acceptable, the blockchain may invoke the forensic authorized smart contract, storing the authorization relationship in the forensic authorized smart contract data. For example, the hash value on the chain of the completion of the forensic transaction and the account name on the chain of the authorized person may be bound and then the bound authorization relationship stored in the forensic authorization smart contract database.
In the embodiment of the disclosure, the certificate depositing platform can deploy the certificate depositing authorization intelligent contract to the blockchain, and endow the binding relation between the account of the depositor, the account of the authorized person and the certificate depositing hash value to the intelligent contract, so that the authorized person can directly acquire the certificate depositing on the chain. If in the context of handling disputes, the authorized person can directly conduct verification of evidence (proof of stock).
Steps S332 to S336 may be the creation flow of the full-flow certificate authority.
In step S332, a create full flow certificate authority request is initiated.
The request for creating the full-flow certificate can be initiated by a user, and the user can be a certificate-storing user or a non-certificate-storing user authorized in the authorization flow.
In step S334, the service right is checked.
When the certificate storing platform receives a request for creating the full-flow certificate storing, which is sent by a user, the service authority verification can be initiated to the blockchain. The service rights verification may include a service rights verification of the user initiating the request to create the certificate of presence, that is, verifying whether the user has rights to initiate the request to create the certificate of presence.
When the block link receives a service authority verification request sent by the certificate storage platform, the service authority of a user initiating a request for creating a full-flow certificate storage certificate can be verified by calling a certificate storage authorization intelligent contract. For example, a query may be made as to whether a binding relationship exists between the forensic transaction and the user in the forensic authorized smart contract. The blockchain can return the verification result of the service authority to the evidence-storing platform to finish the service authority verification.
In step S336, a full-flow certificate of authenticity is generated.
When the block link receives a request for generating a full-flow certificate deposit certificate sent by a certificate deposit platform, firstly, the certificate deposit content of all stages of a certificate deposit transaction can be inquired; and secondly, the intelligent contract of the full-flow certificate-storing certificate can be called, and the certificate-storing content is verified and assembled based on the full-flow certificate-storing certificate template in the intelligent contract.
As one implementation, based on the acquisition result of the certification content, the blockchain can check whether the certification field meets the requirements, whether each certification stage is complete and the order of the certification stages, and meanwhile, the blockchain can also assemble the certification content into a certification template, generate a whole-flow certification on the chain and return the certification to the user.
In some embodiments, to improve the readability of the full-flow forensic certificate, information such as identity, information, assets, behavior, etc. of the person associated with the forensic transaction may also be included in the full-flow forensic certificate.
In the embodiment of the disclosure, the full-flow certificate-preserving certificate completes the verification of the certificate-preserving content and the assembly of the certificate on the chain through the intelligent contract deployed on the blockchain, completely abandons the processing mode of the under-chain centralized application, and is beneficial to guaranteeing that the certificate content is credible and not tamperable.
In addition, based on the full-flow evidence-storing and proving template, the checksum and the evidence of the on-chain evidence-storing content can be realized, and a plurality of certificates can be integrated into a full-flow evidence-storing certificate, so that a complete evidence chain is formed, and the problem of isolation of single certificates is solved.
Method embodiments of the present disclosure are described above in detail in connection with fig. 1-3, and apparatus embodiments of the present disclosure are described below in detail in connection with fig. 4-6. It is to be understood that the description of the device embodiments corresponds to the description of the method embodiments, and that parts not described in detail can therefore be seen in the preceding method embodiments.
Fig. 4 is a schematic diagram of a blockchain-based documented acquisition device in accordance with an embodiment of the present disclosure, and the device 400 shown in fig. 4 may be located in a blockchain. The apparatus 400 may include a first receiving module 410 and a processing module 420.
A first receiving module 410 is configured to receive a first request from a forensic platform, where the first request is initiated by a forensic user or the non-forensic user via the forensic platform, and the first request is used to request forensic content of the forensic transaction and/or to request forensic proof of the forensic transaction.
The processing module 420 is configured to, in response to the first request, obtain the forensic content of the forensic transaction, and/or generate a forensic proof of the forensic transaction based on the forensic content of the forensic transaction.
In one possible implementation, the apparatus further includes: the second receiving module is used for receiving a second request from the certification platform, wherein the second request is used for requesting the authority of the certification transaction to be authorized to the non-certification user; and the storage module is used for responding to the second request, and the blockchain stores the authorization relation of the authorities of the non-licensed user and the licensed transaction in the first intelligent contract.
In one possible implementation, the storage module is configured to: responding to the second request, and performing front verification on the certification transaction and the non-certification user by the blockchain; and if the result of the pre-verification is qualified, the blockchain stores the authorization relationship of the authorities of the non-authenticated user and the authenticated transaction in the first intelligent contract.
In one possible implementation, the processing module is configured to: responding to the first request, and calling the first intelligent contract by the blockchain to check the service authority of an initiating user of the first request; if the initiating user of the first request has the service authority of the evidence-preserving transaction, the blockchain acquires the evidence-preserving content of the evidence-preserving transaction and/or generates the evidence-preserving evidence of the evidence-preserving transaction based on the evidence-preserving content of the evidence-preserving transaction.
In one possible implementation, the certification transaction includes multiple phases of certification content, and the processing module is configured to: in response to the first request, the blockchain querying forensic content of each of a plurality of phases of the forensic transaction; and/or generating a full flow attestation of the attestation transaction based on the attestation content of each of a plurality of phases of the attestation transaction.
In one possible implementation, the blockchain is deployed with a second smart contract for generating the full-flow forensics of the forensics transaction, the generating the full-flow forensics of the forensics transaction based on forensics content of each of the plurality of phases, comprising: the blockchain invokes the second smart contract to generate the full-flow forensic proof of the forensic transaction based on forensic content of each of the plurality of phases.
In one possible implementation, the generating the full-flow forensic proof of the forensic transaction based on forensic content of each of the plurality of phases includes: acquiring a full-flow evidence-storing and proving template, wherein the full-flow evidence-storing and proving template is used for verifying and assembling the evidence-storing content; and generating a full-flow certification of the certification transaction based on the full-flow certification template and certification content of each of the plurality of phases.
Fig. 5 is a schematic diagram of a blockchain-based forensic device 500 applied to a forensic platform, where the forensic device 500 may include a first receiving module 510 and a first transmitting module 520.
The first receiving module 510 is configured to receive a query sent by a user or generate a certificate verification request, where the query request is used to request to query the certificate content of a certificate transaction, and the generate certificate verification request is used to request to generate a certificate of the certificate transaction.
A first sending module 520 is configured to send a first request to the blockchain to request the blockchain to query the prover content of the prover transaction, or request the blockchain to generate a prover of the prover transaction.
In one possible implementation, the apparatus further includes: the second receiving module is used for receiving an authorization request sent by the user, wherein the authorization request is used for authorizing the authority of the certification transaction to a non-certification user; and the second sending module is used for sending a second request to the blockchain to request the blockchain to store an authorization relation corresponding to the authorization request, wherein the authorization relation comprises the authority of the non-certification user and the certification transaction.
Fig. 6 is a schematic block diagram of an apparatus of a further embodiment of the present disclosure. The apparatus 600 shown in fig. 6 may include: memory 610, processor 620, input/output interface 630. The memory 610, the processor 620, and the input/output interface 630 are connected by an internal connection path, where the memory 610 is configured to store instructions, and the processor 620 is configured to execute the instructions stored in the memory 620 to perform the method described in any of the foregoing embodiments.
It should be appreciated that in the disclosed embodiments, the processor 620 may employ a general-purpose central processing unit (Central Processing Unit, CPU), microprocessor, application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits for executing associated programs to implement the techniques provided by the disclosed embodiments.
The memory 610 may include read only memory and random access memory and provides instructions and data to the processor 620. A portion of the processor 620 may also include non-volatile random access memory. For example, the processor 620 may also store information of the device type.
In implementation, the steps of the apparatus described above may be accomplished by integrated logic circuitry in hardware in the processor 620 or instructions in software. The methods disclosed in connection with the embodiments of the present disclosure may be embodied directly in hardware processor execution or in a combination of hardware and software modules in a processor. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in the memory 610, and the processor 620 can read the information in the memory 610 and complete the steps of the above method in combination with its hardware. To avoid repetition, a detailed description is not provided herein.
It should be appreciated that in embodiments of the present disclosure, the processor may be a central processing unit (Central Processing Unit, CPU), the processor may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
It should be understood that in the disclosed embodiments, "B corresponding to a" means that B is associated with a from which B may be determined. It should also be understood that determining B from a does not mean determining B from a alone, but may also determine B from a and/or other information.
It should be understood that the term "and/or" is merely an association relationship describing the associated object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
It should be understood that, in various embodiments of the present disclosure, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by their functions and internal logic, and should not constitute any limitation on the implementation of the embodiments of the present disclosure.
In the several embodiments provided in the present disclosure, it should be understood that the disclosed systems, devices, and apparatuses may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present disclosure may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present disclosure, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line (digital subscriber Line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be read by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a digital versatile disk (digital video disc, DVD)), or a semiconductor medium (e.g., a Solid State Disk (SSD)), or the like.
The foregoing is merely specific embodiments of the disclosure, but the protection scope of the disclosure is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the disclosure, and it is intended to cover the scope of the disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (19)

1. A blockchain-based method of acquiring a forensic transaction, the blockchain deployed with a first smart contract for authorizing rights of the forensic transaction to non-forensic users, the method comprising:
receiving a first request from a forensic platform, wherein the first request is initiated by a forensic user or a non-forensic user through the forensic platform, and the first request is used for requesting forensic content of the forensic transaction and/or requesting forensic evidence of the forensic transaction;
in response to the first request, the blockchain obtains forensic content of the forensic transaction and/or generates a forensic proof of the forensic transaction based on the forensic content of the forensic transaction.
2. The method of claim 1, the method further comprising:
receiving a second request from the forensic platform, the second request being for requesting authorization of the rights of the forensic transaction to the non-forensic user;
In response to the second request, the blockchain stores in the first smart contract an authorized relationship of the rights of the non-authenticated user, the authenticated transaction.
3. The method of claim 2, the responding to the second request, the blockchain storing in the first smart contract an authorized relationship of the rights of the non-licensed user, the licensed transaction, comprising:
responding to the second request, and performing front verification on the certification transaction and the non-certification user by the blockchain;
and if the result of the pre-verification is qualified, the blockchain stores the authorization relationship of the authorities of the non-authenticated user and the authenticated transaction in the first intelligent contract.
4. The method of claim 1, the responding to the first request, the blockchain obtaining forensic content of the forensic transaction, and/or generating a forensic proof of the forensic transaction based on the forensic content of the forensic transaction, comprising:
responding to the first request, and calling the first intelligent contract by the blockchain to check the service authority of an initiating user of the first request;
if the initiating user of the first request has the service authority of the evidence-preserving transaction, the blockchain acquires the evidence-preserving content of the evidence-preserving transaction and/or generates the evidence-preserving evidence of the evidence-preserving transaction based on the evidence-preserving content of the evidence-preserving transaction.
5. The method of claim 1, the forensic transaction comprising a plurality of phases of forensic content, the responding to the first request, the blockchain obtaining forensic content of the forensic transaction and/or generating a forensic proof of the forensic transaction based on the forensic content of the forensic transaction, comprising:
in response to the first request, the blockchain querying forensic content of each of a plurality of phases of the forensic transaction; and/or
Based on the forensic content of each of the plurality of phases of the forensic transaction, the blockchain generates a full flow forensic proof of the forensic transaction.
6. The method of claim 5, the blockchain being deployed with a second smart contract for generating the full-flow forensics of the forensics transaction, the generating the full-flow forensics of the forensics transaction based on forensics content of each of the plurality of phases, comprising:
the blockchain invokes the second smart contract to generate the full-flow forensic proof of the forensic transaction based on forensic content of each of the plurality of phases.
7. The method of claim 6, the generating the full-flow forensic proof of the forensic transaction based on forensic content of each of the plurality of phases, comprising:
Acquiring a full-flow evidence-storing and proving template, wherein the full-flow evidence-storing and proving template is used for verifying and assembling the evidence-storing content;
and generating a full-flow certification of the certification transaction based on the full-flow certification template and certification content of each of the plurality of phases.
8. A blockchain-based method of obtaining a forensic document, the method being applied to a forensic platform, the method comprising:
receiving a query sent by a user or a certification generation request, wherein the query request is used for requesting to query certification content of a certification transaction, and the certification generation request is used for requesting to generate certification of the certification transaction;
and sending a first request to the blockchain to request the blockchain to inquire the certification content of the certification transaction or request the blockchain to generate the certification of the certification transaction.
9. The method of claim 8, the method further comprising:
receiving an authorization request sent by the user, wherein the authorization request is used for authorizing the authority of the certification transaction to a non-certification user;
and sending a second request to the blockchain to request the blockchain to store an authorization relationship corresponding to the authorization request, wherein the authorization relationship comprises the authority of the non-authenticated user and the authenticated transaction.
10. An apparatus for obtaining a forensic transaction based on a blockchain deployed with a first smart contract for authorizing rights of the forensic transaction to non-forensic users, the apparatus comprising:
the first receiving module is used for receiving a first request from the evidence storage platform, wherein the first request is initiated by an evidence storage user or the non-evidence storage user through the evidence storage platform, and the first request is used for requesting the evidence storage content of the evidence storage transaction and/or requesting the evidence storage evidence of the evidence storage transaction;
and the processing module is used for responding to the first request, acquiring the certification content of the certification transaction by the blockchain, and/or generating the certification of the certification transaction based on the certification content of the certification transaction.
11. The apparatus of claim 10, the apparatus further comprising:
the second receiving module is used for receiving a second request from the certification platform, wherein the second request is used for requesting the authority of the certification transaction to be authorized to the non-certification user;
and the storage module is used for responding to the second request, and the blockchain stores the authorization relation of the authorities of the non-licensed user and the licensed transaction in the first intelligent contract.
12. The apparatus of claim 11, the storage module to:
responding to the second request, and performing front verification on the certification transaction and the non-certification user by the blockchain;
and if the result of the pre-verification is qualified, the blockchain stores the authorization relationship of the authorities of the non-authenticated user and the authenticated transaction in the first intelligent contract.
13. The apparatus of claim 10, the processing module to:
responding to the first request, and calling the first intelligent contract by the blockchain to check the service authority of an initiating user of the first request;
if the initiating user of the first request has the service authority of the evidence-preserving transaction, the blockchain acquires the evidence-preserving content of the evidence-preserving transaction and/or generates the evidence-preserving evidence of the evidence-preserving transaction based on the evidence-preserving content of the evidence-preserving transaction.
14. The apparatus of claim 10, the certification transaction comprising multiple phases of certification content, the processing module to:
in response to the first request, the blockchain querying forensic content of each of a plurality of phases of the forensic transaction; and/or
Based on the forensic content of each of the plurality of phases of the forensic transaction, the blockchain generates a full flow forensic proof of the forensic transaction.
15. The apparatus of claim 14, the blockchain to be deployed with a second smart contract to generate the full-flow forensic proof of the forensic transaction, the blockchain to generate the full-flow forensic proof of the forensic transaction based on forensic content of each of the plurality of phases, comprising:
the blockchain invokes the second smart contract to generate the full-flow forensic proof of the forensic transaction based on forensic content of each of the plurality of phases.
16. The apparatus of claim 15, the generating the full-flow forensic proof of the forensic transaction based on forensic content of each of the plurality of phases, comprising:
acquiring a full-flow evidence-storing and proving template, wherein the full-flow evidence-storing and proving template is used for verifying and assembling the evidence-storing content;
and generating a full-flow certification of the certification transaction based on the full-flow certification template and certification content of each of the plurality of phases.
17. An apparatus for obtaining a forensic document based on a blockchain, the apparatus being applied to a forensic platform, the apparatus comprising:
the first receiving module is used for receiving a query sent by a user or generating a certification request, wherein the query request is used for requesting to query certification content of a certification transaction, and the certification request is used for requesting to generate certification of the certification transaction;
And the first sending module is used for sending a first request to the blockchain to request the blockchain to inquire the certification content of the certification transaction or request the blockchain to generate the certification of the certification transaction.
18. The apparatus of claim 17, the apparatus further comprising:
the second receiving module is used for receiving an authorization request sent by the user, wherein the authorization request is used for authorizing the authority of the certification transaction to a non-certification user;
and the second sending module is used for sending a second request to the blockchain to request the blockchain to store an authorization relation corresponding to the authorization request, wherein the authorization relation comprises the authority of the non-certification user and the certification transaction.
19. A blockchain-based device for obtaining a forensic certificate, comprising a memory having executable code stored therein and a processor configured to execute the executable code to cause the device to implement the method of any of claims 1-9.
CN202310365462.2A 2023-04-04 2023-04-04 Block chain-based method and device for obtaining and storing certificate Pending CN116467742A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310365462.2A CN116467742A (en) 2023-04-04 2023-04-04 Block chain-based method and device for obtaining and storing certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310365462.2A CN116467742A (en) 2023-04-04 2023-04-04 Block chain-based method and device for obtaining and storing certificate

Publications (1)

Publication Number Publication Date
CN116467742A true CN116467742A (en) 2023-07-21

Family

ID=87183564

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310365462.2A Pending CN116467742A (en) 2023-04-04 2023-04-04 Block chain-based method and device for obtaining and storing certificate

Country Status (1)

Country Link
CN (1) CN116467742A (en)

Similar Documents

Publication Publication Date Title
CN108898389B (en) Content verification method and device based on block chain and electronic equipment
TWI716140B (en) Data processing method and device based on blockchain
US11645632B2 (en) System and method for a decentralized portable information container supporting privacy protected digital information credentialing, remote administration, local validation, access control and remote instruction signaling utilizing blockchain distributed ledger and container wallet technologies
WO2020088108A1 (en) Blockchain-based data attestation method and apparatus, and electronic device
US20200145373A1 (en) System for blockchain based domain name and ip number register
US11663595B1 (en) Blockchain transactional identity verification
CN112801778B (en) Alliance type bad asset block chain system
CN112561407B (en) Asset management method, system and device based on block chain
CN110674531A (en) Residence information management method, device, server and medium based on block chain
CN113689216A (en) Cross-chain transaction processing method and device, equipment, storage medium and program product
CN111133435B (en) Method and server for validating electronic documents
CN114389810A (en) Certificate generation method and device, electronic device and storage medium
CN112350863B (en) Decentralized access control method and system based on transaction
CN116975901A (en) Identity verification method, device, equipment, medium and product based on block chain
US20230188353A1 (en) Multi-issuer anonymous credentials for permissioned blockchains
CN116467742A (en) Block chain-based method and device for obtaining and storing certificate
KR102450412B1 (en) SLA-Based Sharing Economy Service with Smart Contract for Resource Integrity in the Internet of Things
Lisi et al. Automated responsible disclosure of security vulnerabilities
Mehta et al. Security in e-services and applications
KR102503504B1 (en) System and method for genuine product certification using the block chain network
CN115660679B (en) Decentralizing safe transaction method based on hash locking
CN114978681B (en) Service application authorization method and device based on block chain and processor
CN116468562A (en) Insurance claim settlement method and apparatus based on block chain
US20230224309A1 (en) Method and system for digital identity and transaction verification
CN115905251A (en) Block chain based evidence storing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination