WO2020119265A1 - 基于区块链的取证方法及装置 - Google Patents

基于区块链的取证方法及装置 Download PDF

Info

Publication number
WO2020119265A1
WO2020119265A1 PCT/CN2019/112659 CN2019112659W WO2020119265A1 WO 2020119265 A1 WO2020119265 A1 WO 2020119265A1 CN 2019112659 W CN2019112659 W CN 2019112659W WO 2020119265 A1 WO2020119265 A1 WO 2020119265A1
Authority
WO
WIPO (PCT)
Prior art keywords
forensic
data
network
blockchain
user
Prior art date
Application number
PCT/CN2019/112659
Other languages
English (en)
French (fr)
Inventor
栗志果
徐惠
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Publication of WO2020119265A1 publication Critical patent/WO2020119265A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Definitions

  • This specification relates to the field of computer technology, and in particular to a blockchain-based forensic method and device.
  • the process of network forensics includes: impartial personnel performing network operations on the computer of the impartiality office to obtain forensic data.
  • impartial personnel performing network operations on the computer of the impartiality office to obtain forensic data.
  • the entire process of capturing the forensic data by the impartial personnel is recorded.
  • the purpose of one or more embodiments of this specification is to provide a blockchain-based forensics method and device to solve the problem of time-consuming forensics in the prior art, the efficiency of forensics is low, and the labor cost of forensics is high and cannot be guaranteed The question of the credibility of forensic data.
  • one or more embodiments of this specification provide a blockchain-based forensics method, including:
  • the calling a smart contract deployed on the blockchain to control the nodes in the blockchain to perform forensic operations according to the forensic identification information to obtain corresponding forensic data includes:
  • the signing of the forensic data includes:
  • the forensic data is signed by stamping the forensic data with a blockchain certificate time stamp.
  • the obtaining the user's network forensics request includes:
  • the user's network forensic request is converted by the proxy server according to the original network forensic request sent by the user's terminal.
  • the acquiring the user's network forensic request and acquiring the forensic identification information according to the network forensic request include:
  • the sending the signed forensic data to the user's terminal includes:
  • one or more embodiments of this specification provide a blockchain-based forensics device, including:
  • An obtaining module configured to obtain a user's network forensics request, and obtain forensic identification information according to the network forensics request;
  • the execution module is used to invoke the smart contract deployed on the blockchain and control the nodes in the blockchain to perform forensic operations according to the forensic identification information to obtain corresponding forensic data;
  • the signature module is used to sign the forensic data and send the signed forensic data to the user's terminal.
  • one or more embodiments of this specification provide a blockchain-based forensics device, including:
  • a memory arranged to store computer-executable instructions, which when executed, causes the processor to:
  • one or more embodiments of the present specification provide a storage medium for storing computer-executable instructions, which, when executed, implement the following process:
  • obtain forensic identification information according to the network forensics request and call the smart contract deployed on the blockchain to control the nodes in the blockchain to perform forensic operations based on the forensic identification information to obtain the corresponding Forensic data, and sign the forensic data, and send the signed forensic data to the user terminal.
  • the nodes in the blockchain are controlled to perform forensic operations based on the forensic identification information to obtain corresponding forensic data.
  • FIG. 1 is a schematic diagram 1 of an application scenario of a blockchain-based forensic method provided by one or more embodiments of this specification;
  • FIG. 2 is a schematic diagram 2 of an application scenario of a blockchain-based forensic method provided by one or more embodiments of this specification;
  • FIG. 3 is a schematic flowchart of a blockchain-based forensic method provided by one or more embodiments of this specification
  • FIG. 4 is a structural block diagram of a blockchain-based forensic device provided by one or more embodiments of the present specification
  • FIG. 5 is a schematic block diagram of a blockchain-based forensics device provided by one or more embodiments of the present specification.
  • One or more embodiments of this specification provide a blockchain-based forensics method and device to solve the problem of time-consuming forensics in the prior art, the efficiency of forensics is low, and the labor cost of forensics is high, and forensics data cannot be guaranteed The question of credibility.
  • FIG. 1 is a schematic diagram 1 of an application scenario of a blockchain-based forensics method provided by one or more embodiments of the present specification.
  • the system may include: a user’s terminal and a blockchain, where the user’s terminal is, for example, It may be a mobile phone, a computer, etc., which is not particularly limited in this exemplary embodiment.
  • the blockchain includes multiple blockchain nodes, and smart contracts are deployed on the blockchain, where smart contracts include forensics operations.
  • the forensics process may include:
  • the user's terminal When forensic on network behavior, the user's terminal generates the original network forensic request and sends the original network forensic request to the blockchain; the blockchain converts the original network forensic request according to a preset format to obtain the user's Network forensics request, and obtain forensic identification information according to the network forensic request, and call the smart contract deployed on it to control the nodes to perform forensic operations based on the forensic identification information to obtain corresponding forensic data. Finally, after signing the forensic data Send to the user's terminal to complete the entire forensics process.
  • FIG. 2 is a schematic diagram 2 of an application scenario of a blockchain-based forensic method provided by one or more embodiments of the present specification.
  • the system may include: a user’s terminal, a proxy server, and a blockchain, where the user
  • the terminal may be, for example, a mobile phone, a computer, and the like, which is not particularly limited in this exemplary embodiment.
  • the blockchain includes multiple blockchain nodes, and smart contracts are deployed on the blockchain, where smart contracts include forensics operations.
  • the forensics process may include:
  • the user's terminal During forensics on network behavior, the user's terminal generates the original network forensics request and sends the original network forensics request to the proxy server; the proxy server converts the original network forensics request into the user's network forensics request, and the user's network forensics The request is sent to the blockchain; the blockchain receives the user's network forensics request, and obtains the forensic identification information according to the network forensic request, and calls the smart contract deployed on it, and controls the nodes to perform forensic operations based on the forensic identification information to obtain Corresponding forensic data; Finally, the methods for signing forensic data can include the following two types. Among them, the first one is that the blockchain signs the forensic data and sends it to the proxy server.
  • the proxy server receives the signed forensics Data, and send it to the user's terminal to complete the entire forensic process; the second, the blockchain will send the forensic data to the proxy server; the proxy server receives the forensic data, signs the forensic data, and signs the forensic data After the forensic data is sent to the user's terminal to complete the entire forensic process.
  • FIG. 3 is a schematic flowchart of a blockchain-based forensic method provided by one or more embodiments of the present specification.
  • the method in FIG. 3 can be executed by the blockchain in FIG. 1 or FIG. 2, as shown in FIG. 3, the The method includes at least the following steps:
  • Step S320 Acquire a user's network forensics request, and obtain forensic identification information according to the network forensics request.
  • obtaining a user's network forensics request may include the following two methods, among which:
  • HTTP hypertext transfer protocol
  • SMTP simple mail transfer protocol
  • FTP file Transmission protocol
  • any type of original network forensics request received is converted into HTTP format, that is, the user's network forensics
  • the requests are all in HTTP format.
  • the above infringement information may be a link to a webpage that publishes an infringing object.
  • the infringing information is a link to the webpage that publishes the article.
  • the infringing object is a video
  • the infringing information is the one that published the video.
  • a link to a webpage for example, if the infringing object is a picture, the infringing information is a link to the webpage that published the picture.
  • the above infringement information may also be a link to the website to which the infringing object’s webpage belongs and the basic information of the object, where the basic information of the object includes the object’s title, author, etc.
  • the infringing information is the link to the website to which the article's webpage belongs and the article's title, author, etc. (that is, the basic information of the object).
  • the infringing information is the publication of the The link of the website to which the video's webpage belongs and the title, author, etc. of the video (that is, the basic information of the object), for example, if the infringing object is a picture, the infringing information is the link of the website to which the picture is published and the picture's Title, author, etc. (ie the basic information of the object).
  • the above infringement information is only exemplary, and it can also be in other forms, but no matter what form the infringement information is, it is necessary to ensure that the infringing object can be found based on the infringement information.
  • the above-mentioned first way corresponds to the application scenario in FIG. 1.
  • the user's network forensics request is converted by the proxy server according to the original network forensics request sent by the user's terminal. Specifically, if there is infringement on the network, the user can enter the infringing information in the terminal and perform the forensic operation in the terminal.
  • the terminal responds to the forensic operation, obtains the infringing information, and generates the original network forensic request based on the infringing information, and Send the original network forensic request to the proxy server;
  • the proxy server receives the original network forensic request sent by the user's terminal, because the type of the original network forensic request can include HTTP (Hypertext Transfer Protocol), SMTP (Simple Mail Transfer Protocol), FTP (File transfer protocol), etc. Therefore, in order to facilitate the calculation of the blockchain, the proxy server converts different types of original network forensics requests according to a preset format to obtain the user's network forensics request, that is, different types of original network forensics requests Convert to a unified format.
  • the process by which the proxy server converts the original network forensic request into the user's network forensic request is the same as the conversion principle in the first way, so it will not be repeated here. Since the infringement information has already been explained above, it will not be repeated here.
  • the proxy server converts the original network forensic request into a user's network forensic request the user's network forensic request is sent to the blockchain, so that the blockchain receives the user's network forensic request.
  • the above second method corresponds to the application scenario in FIG. 2.
  • the forensic operation in the above two modes may include, for example, a click operation and a double-click operation on the forensic control on the display interface of the user's terminal, which is not particularly limited in this exemplary embodiment.
  • the blockchain obtains the user's network forensics request
  • the user's network forensics request is parsed to obtain forensic identification information from the network forensics request.
  • the forensic identification information is the same as the definition of the above infringement information, so it will not be repeated here.
  • obtain the user's network forensic request, and obtain the forensic identification information according to the network forensic request may include: obtaining the encrypted user's network forensic request, the encrypted user's network Decrypt the forensic request to obtain the decrypted user's network forensic request; obtain the forensic identification information according to the decrypted user's network forensic request.
  • the user's terminal encrypts the original network forensic request after generating the original network forensic request, and sends the encrypted original network forensic request to
  • the blockchain converts the encrypted original network forensic request according to a preset format to obtain the encrypted user's network forensic request.
  • the blockchain decrypts the encrypted user's network forensics request and parses the decrypted user's network forensics request to obtain forensic identification information.
  • the following examples illustrate the above encryption and decryption process.
  • the user's terminal encrypts the original network forensic request through the public key, and sends the encrypted original network forensic request to the blockchain.
  • the blockchain receives the encrypted original network forensic request, and the encrypted original The network forensic request is converted according to a preset format to obtain the encrypted user's network forensic request, and the encrypted user's network forensic request is decrypted according to the private key corresponding to the public key to obtain the decrypted user's network Forensics request, analyze the decrypted user's network forensics request to obtain forensic identification information.
  • the user's terminal generates the original network forensic request, encrypts the original network forensic request for the first time, and sends the first encrypted original network forensic request to the proxy server ;
  • the proxy server converts the first encrypted original network forensics request into a user's network forensics request according to a preset format, and encrypts the user's network forensics request a second time, and encrypts the user's network forensics for the second time
  • the request is sent to the blockchain; after receiving the second encrypted user's network forensics request, the blockchain decrypts the second encrypted user's network forensics request twice to obtain the decrypted user's
  • the network forensics request, and the decrypted user's network forensics request is parsed to obtain forensic identification information.
  • the user's terminal encrypts the original network forensic request for the first time through the first public key, and sends the first encrypted original network forensic request to the proxy server.
  • the proxy server encrypts the first encrypted original network forensic request Transform according to the preset format to obtain the user's network forensics request;
  • the proxy server encrypts the user's network forensics request a second time through the second public key, and sends the user's network forensics request after the second encryption to the district Blockchain;
  • Blockchain receives the user's network forensics request after the second encryption, and sequentially encrypts the second time through the second private key corresponding to the second public key and the first public key corresponding to the first public key
  • the decrypted user's network forensic request is decrypted twice to obtain the decrypted user's network forensic request, and the decrypted user's network forensic request is parsed to obtain forensic identification information.
  • the request is transmitted between the user's end point and the blockchain, between the user's terminal and the proxy server, and between the proxy server and the blockchain through encryption, avoiding network hijacking and ensuring the security of the request transmission Sex and reliability.
  • step S340 the smart contract deployed on the blockchain is called to control the nodes in the blockchain to perform forensic operations according to the forensic identification information to obtain corresponding forensic data.
  • the blockchain when obtaining forensic identification information, invokes a smart contract deployed thereon.
  • the smart contract includes the forensic operation, and controls the nodes in it to perform the forensic operation according to the forensic identification information to obtain the corresponding Forensic data.
  • the above process of obtaining forensic data may include: invoking a smart contract and controlling each node in the blockchain to perform forensic operations according to the forensic identification information to obtain the execution of each node Consensus processing of the data and the execution data of each node, and use the consensus execution data as forensic data, that is, the blockchain calls the smart contract deployed on it, and controls each of the nodes to execute intelligence based on the forensic identification information Forensic operation in the contract to get the execution data of each node, and according to the execution data of each node to determine whether the execution data of most of the nodes or all nodes are consistent, if most of the nodes Or, if the execution data of all nodes are consistent, the consensus processing of the execution data of each node is completed, and the consensus execution data is determined as the forensic data.
  • the forensic identification information is a link to a webpage publishing an infringing object
  • the forensic operation included in the smart contract is to obtain infringing data according to the link to the webpage publishing the infringing object.
  • the specific process is that the blockchain invokes a smart contract and controls each node in it to obtain infringement data according to the link of the web page that announces the infringing object, and determines the infringement data obtained by each node as the execution data of each node.
  • the forensic data may include the content of the video, the title of the video, the author of the video, the time when the video was posted on the infringing webpage, the page views of the video, etc. This exemplary embodiment does not specifically limit this.
  • the basic information of the object may include the name of the object, the author, etc.
  • the basic information of the object Including the name of the article, author, etc.
  • the basic information of the object can include the name of the picture, the author, etc.
  • the forensic operations included in the smart contract include: obtaining the website to which the infringing object webpage belongs according to the link of the website to which the infringing object webpage belongs and traversing each of the websites to which the infringing object webpage is published Linked webpage data, and match each linked webpage data with the basic information of the object, and determine the webpage data that matches the basic information of the object as infringement data.
  • the process of obtaining forensic data may include: the blockchain calls a smart contract, and controls each node to obtain the website to which the infringing object webpage belongs according to the link of the website to which the infringing object webpage belongs, and traverse to announce the infringement
  • Each linked webpage data in the website to which the object's webpage belongs matches each linked webpage data obtained in each node in the website to which the infringing object's webpage belongs to the object's basic information, and matches each The webpage data matching the basic information of the object in the website to which the webpage that announces the infringing object acquired by the node is determined as the infringing data of each node, and the infringing data of each node is determined as the execution of each node data.
  • Step S360 sign the forensic data, and send the signed forensic data to the user's terminal.
  • the forensic data needs to be signed, the specific visa method can be: the forensic data is signed by stamping the blockchain certificate time stamp on the forensic data; and the certification method can also be stamped for the forensic data Sign the forensic data.
  • the specific form of the certification mark can be set by the developer.
  • the certification mark can be a two-dimensional code picture or a string composed of multiple characters. This example The sexual embodiment does not make any special limitation on this.
  • the execution subject of the signature may be a node in the blockchain, or all nodes in the blockchain, etc. This exemplary embodiment does not specifically limit this.
  • the execution body of the signature may be an agent in addition to a node or multiple nodes in the blockchain, etc.
  • the server is not particularly limited in this exemplary embodiment.
  • sending the forensic data after signing to the user's terminal may include: encrypting the forensic data after signing to obtain encrypted forensic data, And send the encrypted forensic data to the user's terminal.
  • the blockchain can encrypt the forensic data after signature by the public key to obtain encrypted forensic data, and then encrypt the The forensic data is sent to the user's terminal, so that the user's terminal decrypts the encrypted forensic data through the private key corresponding to the public key to obtain the decrypted forensic data.
  • the blockchain can perform the first encryption process on the forensic data after signing through the first public key to obtain the first encrypted forensic data, and
  • the forensic data encrypted once is sent to the proxy server, and the proxy server encrypts the forensic data encrypted for the first time through the second public key to obtain the forensic data encrypted for the second time, and the encrypted data for the second encryption
  • the forensic data is sent to the user's terminal.
  • the user terminal can sequentially decrypt the second encrypted forensic data according to the second private key corresponding to the second public key and the first private key corresponding to the first public key to obtain the decryption After the forensic data.
  • the nodes in the blockchain are controlled to perform forensic operations based on the forensic identification information to obtain corresponding forensic data.
  • Obtain forensic data by performing network operations that is, without manual methods, automatic acquisition of forensic data is achieved, which greatly shortens the time of forensics, improves the efficiency of forensics, and also reduces the labor cost of forensics;
  • Due to the invocation of smart contracts Control the nodes in the blockchain to perform the forensic operation according to the forensic identification information to obtain the corresponding forensic data. That is, set the forensic operation in the smart contract and run it in the blockchain to avoid the influence of human factors and ensure the network environment.
  • Credibility that is, the forgery of network links and forgery of website information must be avoided, thereby ensuring the credibility of forensic data; in addition, by signing the forensic data, network hijacking can be avoided, which further guarantees forensics The credibility of the data.
  • FIG. 4 is a blockchain-based forensic device provided by one or more embodiments of the present specification. Block diagram of the forensic device. As shown in FIG. 4, the blockchain-based forensic device 400 may include: an acquisition module 401, an execution module 402, and a signature module 403, where:
  • the obtaining module 401 can be used to obtain a user's network forensics request and obtain forensic identification information according to the network forensics request;
  • the execution module 402 can be used to invoke smart contracts deployed on the blockchain, and control nodes in the blockchain to perform forensic operations based on forensic identification information to obtain corresponding forensic data;
  • the signature module 403 may be used to sign the forensic data and send the forensic data after the signature to the user's terminal.
  • the execution module 402 may include:
  • the calling unit is used to call a smart contract and control each node in the blockchain to perform a forensic operation according to the forensic identification information to obtain the execution data of each node;
  • the consensus unit is used to perform consensus processing on the execution data of each node, and the consensus execution data is used as forensic data.
  • the signature module 403 is specifically used to sign the forensic data by stamping the forensic data with a blockchain certificate time stamp.
  • the obtaining module 401 is specifically configured to receive the original network forensic request sent by the user's terminal, convert the original network forensic request according to a preset format to obtain the user's network forensic request; or receive the user's network forensic request sent by the proxy server Network forensics request, the user's network forensics request is converted by the proxy server according to the original network forensics request sent by the user's terminal.
  • the obtaining module 401 is specifically used to obtain an encrypted user's network forensic request, decrypt the encrypted user's network forensic request to obtain the decrypted user's network forensic request, and according to the decrypted user Of network forensics requests to obtain forensic identification information.
  • the signature module 403 is specifically used to encrypt the forensic data after signature to obtain encrypted forensic data, and send the encrypted forensic data to the user's terminal.
  • the blockchain-based forensics device controls the nodes in the blockchain to perform forensic operations based on the forensic identification information by invoking the smart contract deployed on the blockchain to obtain corresponding forensic data, compared to
  • the automatic acquisition of forensic data is realized, which greatly shortens the time of forensics, improves the efficiency of forensics, and also reduces the Labor cost;
  • the smart contract is called to control the nodes in the blockchain to perform the forensic operation according to the forensic identification information to obtain the corresponding forensic data, that is, set the forensic operation in the smart contract and run it in the blockchain, avoiding artificial
  • the influence of factors ensures the credibility of the network environment, that is, the forgery of network links and forgery of website information must be avoided, and the credibility of forensic data can be ensured.
  • an embodiment of the present application further provides a blockchain-based forensics device, as shown in FIG. 5.
  • Blockchain-based forensics devices can have relatively large differences due to differences in configuration or performance. They can include one or more processors 501 and memory 502. One or more storage applications or data can be stored in the memory 502. Among them, the memory 502 may be short-term storage or persistent storage.
  • the application program stored in the memory 502 may include one or more modules (not shown in the figure), and each module may include a series of computer-executable instructions in the blockchain-based forensics device.
  • the processor 501 may be configured to communicate with the memory 502 to execute a series of computer-executable instructions in the memory 502 on a blockchain-based forensic device.
  • the blockchain-based forensics device may also include one or more power sources 503, one or more wired or wireless network interfaces 504, one or more input and output interfaces 505, one or more keyboards 506, and so on.
  • the blockchain-based forensics device includes a memory and one or more programs, where one or more programs are stored in the memory, and one or more programs may include one or more Modules, and each module may include a series of computer-executable instructions to a blockchain-based forensics device, and is configured to be executed by one or more processors.
  • the one or more programs include the following computer executable Execution instructions:
  • the smart contract deployed on the blockchain is called to control the nodes in the blockchain to perform the forensic operation according to the forensic identification information to obtain the corresponding forensic data including:
  • signing the forensic data includes:
  • obtaining the user's network forensics request includes:
  • the user's network forensic request sent by the proxy server is received, and the user's network forensic request is converted by the proxy server according to the original network forensic request sent by the user's terminal.
  • obtaining the user's network forensics request, and obtaining the forensic identification information according to the network forensics request include:
  • sending the signed forensic data to the user's terminal includes:
  • the blockchain-based forensics equipment controls the nodes in the blockchain to perform forensic operations based on the forensic identification information by invoking smart contracts deployed on the blockchain, to obtain corresponding forensic data, compared to
  • the automatic acquisition of forensic data is realized, which greatly shortens the time of forensics, improves the efficiency of forensics, and also reduces the Labor cost;
  • the smart contract is called to control the nodes in the blockchain to perform the forensic operation according to the forensic identification information to obtain the corresponding forensic data, that is, set the forensic operation in the smart contract and run it in the blockchain, avoiding artificial
  • the influence of factors ensures the credibility of the network environment, that is, the forgery of network links and forgery of website information must be avoided, and the credibility of forensic data can be ensured.
  • an embodiment of the present application also provides a storage medium for storing computer-executable instructions.
  • the storage medium may be a U disk, an optical disk, a hard disk, etc., and the storage medium stores a computer
  • the executable instruction is executed by the processor, the following process can be realized:
  • the smart contract deployed on the blockchain is called to control the nodes in the blockchain to perform the forensic operation according to the forensic identification information to obtain the corresponding forensics
  • the data includes:
  • signing the forensic data includes:
  • obtaining the user's network forensics request includes:
  • the user's network forensic request sent by the proxy server is received, and the user's network forensic request is converted by the proxy server according to the original network forensic request sent by the user's terminal.
  • acquiring the user's network forensic request, and acquiring the forensic identification information according to the network forensic request include:
  • sending the signed forensic data to the user's terminal includes:
  • the smart contract deployed on the blockchain is called to control the nodes in the blockchain to perform the forensic operation according to the forensic identification information to obtain the corresponding
  • the forensic data is not obtained by the method of impartial personnel performing network operations, that is, the manual method is not used, which realizes the automatic acquisition of forensic data, greatly shortens the time of forensics, and improves the efficiency of forensics At the same time, it also reduces the labor cost of forensics;
  • the smart contract is called to control the nodes in the blockchain to perform the forensic operation according to the forensic identification information to obtain the corresponding forensic data, that is, set the forensic operation in the smart contract and set it in the block
  • the operation in the chain avoids the influence of human factors and guarantees the credibility of the network environment, that is, it must avoid the occurrence of forging network links and forging website information, and thus guarantee the credibility of forensic data; in addition, through
  • the improvement of a technology can be clearly distinguished from the improvement in hardware (for example, the improvement of circuit structures such as diodes, transistors, and switches) or the improvement in software (the improvement of the process flow).
  • the improvement of many methods and processes can be regarded as a direct improvement of the hardware circuit structure.
  • Designers almost get the corresponding hardware circuit structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that the improvement of a method flow cannot be realized by hardware physical modules.
  • a programmable logic device Programmable Logic Device, PLD
  • PLD Programmable Logic Device
  • FPGA Field Programmable Gate Array
  • HDL Hardware Description Language
  • ABEL Advanced Boolean Expression
  • AHDL AlteraHardwareDescriptionLanguage
  • Confluence a specific programming language
  • CUPL CornellUniversityProgrammingLanguage
  • HDCal JHDL (JavaHardwareDescriptionLanguage)
  • Lava Lola
  • MyHDL PALASM
  • RHDL RubyHardwareDescription
  • the controller may be implemented in any suitable manner, for example, the controller may take a microprocessor or processor and a computer-readable medium storing computer-readable program code (such as software or firmware) executable by the (micro)processor , Logic gates, switches, application specific integrated circuits (Application Specific Integrated Circuit, ASIC), programmable logic controllers and embedded microcontrollers.
  • Examples of controllers include but are not limited to the following microcontrollers: ARC625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicon Labs C8051F320, the memory controller can also be implemented as part of the control logic of the memory.
  • controller in addition to implementing the controller in the form of pure computer-readable program code, it is entirely possible to logically program method steps to make the controller use logic gates, switches, application specific integrated circuits, programmable logic controllers and embedded To achieve the same function in the form of a microcontroller, etc. Therefore, such a controller can be regarded as a hardware component, and the device for implementing various functions included therein can also be regarded as a structure within the hardware component. Or even, the means for realizing various functions can be regarded as both a software module of an implementation method and a structure within a hardware component.
  • the system, device, module or unit explained in the above embodiments may be specifically implemented by a computer chip or entity, or implemented by a product with a certain function.
  • a typical implementation device is a computer.
  • the computer may be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
  • one or more embodiments of this specification may be provided as a method, system, or computer program product. Therefore, one or more embodiments of this specification may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware. Moreover, one or more embodiments of this specification may employ computer programs implemented on one or more computer usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer usable program code The form of the product.
  • computer usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions can be provided to the processor of a general-purpose computer, special-purpose computer, embedded processing machine, or other programmable data processing device to produce a machine that enables the generation of instructions executed by the processor of the computer or other programmable data processing device
  • These computer program instructions may also be stored in a computer-readable memory that can guide a computer or other programmable data processing device to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including an instruction device, the instructions
  • the device implements the functions specified in one block or multiple blocks of the flowchart one flow or multiple flows and/or block diagrams.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device, so that a series of operating steps are performed on the computer or other programmable device to produce computer-implemented processing, which is executed on the computer or other programmable device
  • the instructions provide steps for implementing the functions specified in one block or multiple blocks of the flowchart one flow or multiple flows and/or block diagrams.
  • the computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-permanent memory, random access memory (RAM) and/or non-volatile memory in computer-readable media, such as read only memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
  • RAM random access memory
  • ROM read only memory
  • flash RAM flash random access memory
  • Computer-readable media including permanent and non-permanent, removable and non-removable media, can store information by any method or technology.
  • the information may be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only compact disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, Magnetic tape cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices.
  • computer-readable media does not include temporary computer-readable media (transitory media), such as modulated data signals and carrier waves.
  • program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types.
  • the present application may also be practiced in distributed computing environments in which tasks are performed by remote processing devices connected through a communication network.
  • program modules may be located in local and remote computer storage media including storage devices.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Computer Security & Cryptography (AREA)
  • Educational Administration (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Development Economics (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

一种基于区块链的取证方法及装置,其中,方法包括:获取用户的网络取证请求,并根据所述网络取证请求获取取证标识信息(S320);调用区块链上部署的智能合约,控制所述区块链中的节点根据所述取证标识信息执行取证操作,以得到相应的取证数据(S340);对所述取证数据进行签章,并将签章后的所述取证数据发送至所述用户的终端(S360)。实现了取证数据的自动获取,大大的缩短了取证时间,提高了取证效率,同时也降低了取证的人力成本,另外也保证了网络环境的可信度和取证数据的可信度。

Description

基于区块链的取证方法及装置 技术领域
本说明书涉及计算机技术领域,尤其涉及一种基于区块链的取证方法及装置。
背景技术
随着网络的普及,网络犯罪也越来越多。要从根本上解决网络犯罪,就要依靠法律,利用有效的法律手段对网络犯罪进行制裁。其中,网络取证已经成为打击网络犯罪的关键问题之一。
目前,网络取证的过程包括:公正人员在公正处的电脑上进行网络操作,以获取取证数据,同时为了保障取证数据的可信度,对公正人员在获取取证数据的过程全程录屏。
然而,在上述方式中,一方面,由于需要公正人员执行网络操作的方式获取取证数据,取证耗时长,取证效率低,且取证的人力成本高;另一方面,虽然采用了全程录屏的方式确保取证数据的可信度,但是,由于录屏的方式无法保障网络环境的可信度,即无法完全避免网络劫持、伪造网络连接、伪造网站信息等行为的发生,因此,录屏无法真正保障取证数据的可信度。
发明内容
本说明书一个或多个实施例的目的是提供一种基于区块链的取证方法及装置,用以解决现有技术中的取证耗时长,取证效率低,且取证的人力成本高,以及无法保障取证数据的可信度的问题。
为解决上述技术问题,本说明书一个或多个实施例是这样实现的:
一方面,本说明书一个或多个实施例提供一种基于区块链的取证方法,包括:
获取用户的网络取证请求,并根据所述网络取证请求获取取证标识信息;
调用区块链上部署的智能合约,控制所述区块链中的节点根据所述取证标识信息执行取证操作,以得到相应的取证数据;
对所述取证数据进行签章,并将签章后的所述取证数据发送至所述用户的终端。
可选的,所述调用区块链上部署的智能合约,控制所述区块链中的节点根据所述取 证标识信息执行取证操作,以得到相应的取证数据包括:
调用所述智能合约,控制所述区块链中的各节点根据所述取证标识信息执行所述取证操作,以得到各所述节点的执行数据;以及
对各所述节点的执行数据进行共识处理,并将得到共识的执行数据作为所述取证数据。
可选的,所述对所述取证数据进行签章包括:
通过对所述取证数据加盖区块链证书时间戳的方式对所述取证数据进行签章。
可选的,所述获取用户的网络取证请求,包括:
接收所述用户的终端发送的原始网络取证请求,对所述原始网络取证请求按照预设格式进行转化,以得到所述用户的网络取证请求;或者
接收代理服务器发送的所述用户的网络取证请求,所述用户的网络取证请求由所述代理服务器根据所述用户的终端发送的原始网络取证请求转化得到。
可选的,所述获取用户的网络取证请求,并根据所述网络取证请求获取取证标识信息包括:
获取加密后的用户的网络取证请求,对所述加密后的用户的网络取证请求进行解密,以得到解密后的用户的网络取证请求;
根据所述解密后的用户的网络取证请求获取取证标识信息。
可选的,所述将签章后的所述取证数据发送至所述用户的终端包括:
对签章后的所述取证数据进行加密处理,以得到加密后的取证数据,并将所述加密后的取证数据发送至所述用户的终端。
另一方面,本说明书一个或多个实施例提供一种基于区块链的取证装置,包括:
获取模块,用于获取用户的网络取证请求,并根据所述网络取证请求获取取证标识信息;
执行模块,用于调用区块链上部署的智能合约,控制所述区块链中的节点根据所述取证标识信息执行取证操作,以得到相应的取证数据;
签章模块,用于对所述取证数据进行签章,并将签章后的所述取证数据发送至所述用户的终端。
再一方面,本说明书一个或多个实施例提供一种基于区块链的取证设备,包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
获取用户的网络取证请求,并根据所述网络取证请求获取取证标识信息;
调用区块链上部署的智能合约,控制所述区块链中的节点根据所述取证标识信息执行取证操作,以得到相应的取证数据;
对所述取证数据进行签章,并将签章后的所述取证数据发送至所述用户的终端。
再一方面,本说明书一个或多个实施例提供一种存储介质,用于存储计算机可执行指令,所述可执行指令在被执行时实现以下流程:
获取用户的网络取证请求,并根据所述网络取证请求获取取证标识信息;
调用区块链上部署的智能合约,控制所述区块链中的节点根据所述取证标识信息执行取证操作,以得到相应的取证数据;
对所述取证数据进行签章,并将签章后的所述取证数据发送至所述用户的终端。
采用本说明书一个或多个实施例的技术方案,根据网络取证请求获取取证标识信息,并调用区块链上部署的智能合约,控制区块链中的节点根据取证标识信息执行取证操作以得到相应的取证数据,以及对取证数据进行签章,并将签章后的取证数据发送至用户终端。一方面,通过调用区块链上部署的智能合约,控制区块链中的节点根据取证标识信息执行取证操作,以得到相应的取证数据,相比于现有技术,由于未采用公正人员执行网络操作的方式获取取证数据,即未采用人工方式,实现了取证数据的自动获取,大大的缩短了取证时间,提高了取证效率,同时也降低了取证的人力成本;另一方面,由于调用智能合约控制区块链中的节点根据取证标识信息执行取证操作以得到相应的取证数据,即在智能合约中设置取证操作,并在区块链中运行,避免了人为因素的影响,保证了网络环境的可信度,即必避免了伪造网络链接、伪造网站信息等行为的发生,进而保证了取证数据的可信度;另一方面,通过对取证数据进行签章,可以避免网络劫持,进一步的保证了取证数据的可信度。
附图说明
为了更清楚地说明本说明书一个或多个实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书一个或多个实施例中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本说明书一个或多个实施例提供的基于区块链的取证方法的应用场景示意图一;
图2为本说明书一个或多个实施例提供的基于区块链的取证方法的应用场景示意图二;
图3为本说明书一个或多个实施例提供的基于区块链的取证方法的流程示意图;
图4为本说明书一个或多个实施例提供的基于区块链的取证装置的结构框图;
图5为本说明书一个或多个实施例提供的基于区块链的取证设备的示意性框图。
具体实施方式
本说明书一个或多个实施例提供一种基于区块链的取证方法及装置,用以解决现有技术中的取证耗时长,取证效率低,且取证的人力成本高,以及无法保障取证数据的可信度的问题。
为了使本技术领域的人员更好地理解本说明书一个或多个实施例中的技术方案,下面将结合本说明书一个或多个实施例中的附图,对本说明书一个或多个实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本说明书一部分实施例,而不是全部的实施例。基于本说明书一个或多个实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都应当属于本说明书一个或多个实施例保护的范围。
图1为本说明书一个或多个实施例提供的基于区块链的取证方法的应用场景示意图一,如图1所示,该系统可以包括:用户的终端和区块链,其中用户的终端例如可以为手机、电脑等,本示例性实施例对此不作特殊限定。区块链中包括多个区块链节点,且在区块链上部署有智能合约,其中智能合约中包括取证操作。具体的,取证过程可以包括:
在对网络行为进行取证时,用户的终端生成原始网络取证请求,并将该原始网络取证请求发送至区块链;区块链对该原始网络取证请求按照预设格式进行转化,以得到用户的网络取证请求,并根据网络取证请求获取取证标识信息,以及调用其上部署的智能合约,控制其中的节点根据取证标识信息执行取证操作,以得到相应的取证数据,最后,对取证数据签章之后发送至用户的终端,以完成整个取证过程。
图2为本说明书一个或多个实施例提供的基于区块链的取证方法的应用场景示意图二,如图2所示,该系统可以包括:用户的终端、代理服务器和区块链,其中用户的终端例如可以为手机、电脑等,本示例性实施例对此不作特殊限定。区块链中包括多个区块链节点,且在区块链上部署有智能合约,其中智能合约中包括取证操作。具体的,取证过程可以包括:
在对网络行为进行取证时,用户的终端生成原始网络取证请求,并将该原始网络取证请求发送至代理服务器;代理服务器将原始网络取证请求转化为用户的网络取证请求,并将用户的网络取证请求发送至区块链;区块链接收用户的网络取证请求,并根据网络取证请求获取取证标识信息,以及调用其上部署的智能合约,控制其中的节点根据取证标识信息执行取证操作,以得到相应的取证数据;最后,对取证数据进行签章的方式可以包括以下两种,其中,第一种,区块链对取证数据进行签章后发送至代理服务器,代理服务器接收签章后的取证数据,并将其发送至用户的终端,以完成整个取证过程;第二种,区块链将取证数据发送至代理服务器;代理服务器接收取证数据,并对取证数据进行签章,并将签章后的取证数据发送至用户的终端,以完成整个取证过程。
图3为本说明书一个或多个实施例提供的基于区块链的取证方法的流程示意图,图3中的方法能够由图1或者图2中的区块链执行,如图3所示,该方法至少包括以下步骤:
步骤S320,获取用户的网络取证请求,并根据网络取证请求获取取证标识信息。
在本申请实施例中,若发现网络上存在侵权行为,例如,未经同意在网页中公开其他人的文章、视频等行为,则用户可以通过对侵权行为进行取证以得到取证数据,进而根据取证数据对侵权行为进行打击。具体的,获取用户的网络取证请求可以包括以下两种方式,其中:
第一种、接收用户的终端发送的原始网络取证请求,对原始网络取证请求按照预设格式进行转化,以得到用户的网络取证请求。具体的,若网络上存在侵权行为,则用户 可以通过在终端中输入侵权信息,并在终端中执行取证操作,终端响应该取证操作,获取侵权信息,并根据侵权信息生成原始网络取证请求,以及将原始网络取证请求发送至区块链中;区块链接收该原始网络取证请求,由于原始网络取证请求的类型可以包括HTTP(超文本传输协议)、SMTP(简单邮件传送协议)、FTP(文件传输协议)等,因此,为了便于区块链进行计算,首先将不同类型的原始网络取证请求按照预设格式进行转化,以得到用户的网络取证请求,即将不同类型的原始网络取证请求转化为统一格式。上述预设格式可为原始网络取证请求的类型中的任意一种,例如,若预设格式为HTTP,则将接收到的任何类型的原始网络取证请求均转化为HTTP格式,即用户的网络取证请求均为HTTP格式。
上述侵权信息可以为公布侵权客体的网页的链接,例如,若侵权客体为文章,则侵权信息为公布该文章的网页的链接,再例如,若侵权客体为视频,则侵权信息为公布该视频的网页的链接,再例如,若侵权客体为图片,则侵权信息为公布该图片的网页的链接。上述侵权信息还可以为公布侵权客体的网页所属的网站的链接和客体的基本信息,其中客体的基本信息包括客体的标题、作者等,本示例性实施例对此不做特殊限定,例如,若侵权客体为文章,则侵权信息为公布该文章的网页所属的网站的链接以及该文章的标题、作者等(即客体的基本信息),再例如,若侵权客体为视频,则侵权信息为公布该视频的网页所属的网站的链接以及该视频的标题、作者等(即客体的基本信息),再例如,若侵权客体为图片,则侵权信息为公布该图片的网页所属站的链接以及该图片的标题、作者等(即客体的基本信息)。需要说明的是,上述侵权信息仅为示例性的,其还可以为其他形式,但不论侵权信息是那种形式,均要确保根据侵权信息能够查找到侵权客体。此外,上述第一种方式对应图1中的应用场景。
第二种、接收代理服务器发送的用户的网络取证请求,用户的网络取证请求由代理服务器根据用户的终端发送的原始网络取证请求转化得到。具体的,若网络上存在侵权行为,则用户可以通过在终端中输入侵权信息,并在终端中执行取证操作,终端响应该取证操作,获取侵权信息,并根据侵权信息生成原始网络取证请求,以及将原始网络取证请求发送至代理服务器中;代理服务器接收用户的终端发送的原始网络取证请求,由于原始网络取证请求的类型可以包括HTTP(超文本传输协议)、SMTP(简单邮件传送协议)、FTP(文件传输协议)等,因此,为了便于区块链进行计算,代理服务器将不同类型的原始网络取证请求按照预设格式进行转化,以得到用户的网络取证请求,即将不同类型的原始网络取证请求转化为统一格式。需要说明的是,代理服务器将原始网络取证请求转化为用户的网络取证请求的过程与第一种方式中的转化原理相同,因此此 处不在赘述。由于侵权信息已经在上文中进行了说明,因此此处不再赘述。在代理服务器将原始网络取证请求转化为用户的网络取证请求时,将该用户的网络取证请求发送至区块链,以使区块链接收用户的网络取证请求。需要说明的是,上述第二种方式对应图2中的应用场景。
需要说明的是,上述两种方式中的取证操作例如可以包括作用于用户的终端的显示界面上的取证控件上的点击操作、双击操作等,本示例性实施例对此不做特殊限定。
若区块链获取到用户的网络取证请求,则对用户的网络取证请求进行解析,以从网络取证请求中获取取证标识信息。其中,取证标识信息与上述侵权信息的定义相同,因此此处不再赘述。
为了避免网络劫持,以保证取证过程的可信度,获取用户的网络取证请求,并根据网络取证请求获取取证标识信息可以包括:获取加密后的用户的网络取证请求,对加密后的用户的网络取证请求进行解密,以得到解密后的用户的网络取证请求;根据解密后的用户的网络取证请求获取取证标识信息。
在本申请实施例中,若取证方法的应用场景如图1所示,则用户的终端在生成原始网络取证请求后,对原始网络取证请求进行加密,并将加密后的原始网络取证请求发送至区块链中,区块链对该加密后的原始网络取证请求按照预设格式进行转化,以得到加密后的用户的网络取证请求。区块链通过对加密后的用户的网络取证请求进行解密,并对解密后的用户的网络取证请求进行解析,以得到取证标识信息。下面举例对上述加密和解密的过程进行说明。首先用户的终端通过公钥对原始网络取证请求进行加密,并将加密后的原始网络取证请求发送至区块链,区块链接收该加密后的原始网络取证请求,并将该加密后的原始网络取证请求按照预设格式进行转化,以得到加密后的用户的网路取证请求,以及根据公钥对应的私钥对加密后的用户的网络取证请求进行解密,以得到解密后的用户的网络取证请求,对解密后的用户的网络取证请求进行解析以得到取证标识信息。
若取证方法的应用场景如图2所示,则用户的终端生成原始网络取证请求后,对原始网络取证请求进行第一次加密,并将第一次加密后的原始网络取证请求发送至代理服务器;代理服务器将第一次加密后的原始网络取证请求按照预设格式转化为用户的网络取证请求,并对用户的网络取证请求进行第二次加密,将第二次加密后的用户的网络取证请求发送至区块链;区块链在接收到第二次加密后的用户的网络取证请求后,对该第二次加密后的用户的网络取证请求进行两次解密以得到解密后的用户的网络取证请求, 以及对解密后的用户的网络取证请求进行解析以得到取证标识信息。下面举例对上述加密和解密的过程进行说明。首先用户的终端通过第一公钥对原始网络取证请求进行第一次加密,并将第一次加密后的原始网络取证请求发送至代理服务器,代理服务器对第一次加密后的原始网络取证请求按照预设格式进行转化,以得到用户的网络取证请求;代理服务器通过第二公钥对用户的网络取证请求进行第二次加密,并将第二次加密后的用户的网络取证请求发送至区块链;区块链接收该第二次加密后的用户的网络取证请求,并依次通过与第二公钥对应的第二私钥和与第一公钥对应第一公钥对第二次加密后的用户的网络取证请求进行两次解密,以得到解密后的用户的网络取证请求,以及对解密后的用户的网络取证请求进行解析以得到取证标识信息。
由上可知,通过加密的方式在用户的终点和区块链之间、用户的终端和代理服务器之间、代理服务器与区块链之间传输请求,避免了网络劫持,保证了请求传输的安全性和可靠性。
需要说明的是,上述通过公钥进行加密以及通过公钥对应的私钥进行解密的方式仅为示例性的,并不用于限定本发明。
步骤S340,调用区块链上部署的智能合约,控制区块链中的节点根据取证标识信息执行取证操作,以得到相应的取证数据。
在本申请实施例中,在获取到取证标识信息时,区块链调用其上部署的智能合约,该智能合约包括取证操作,并控制其中的节点根据取证标识信息执行取证操作,以得到相应的取证数据。由于区块链中包括多个区块链节点,因此,上述得到取证数据的过程可以包括:调用智能合约,控制区块链中的各节点根据取证标识信息执行取证操作,以得到各节点的执行数据,以及对各节点的执行数据进行共识处理,并将得到共识的执行数据作为取证数据,即区块链调用其上部署的智能合约,并控制其中的每个节点均根据取证标识信息执行智能合约中的取证操作,以得到每个节点的执行数据,并根据每个节点的执行数据判断多个节点中的大部分节点或者全部节点的执行数据是否一致,若多个节点中的大部分节点或者全部节点的执行数据一致,则完成对每个节点的执行数据的共识处理,并将得到共识的执行数据确定为取证数据。
下面,举例对上述过程进行说明。例如,若取证标识信息为公布侵权客体的网页的链接,则智能合约包括的取证操作为根据公布侵权客体的网页的链接获取侵权数据。具体的过程为,区块链调用智能合约,并控制其中的每个节点根据公布侵权客体的网页的链接获取侵权数据,并将每个节点获取的侵权数据确定为对应的每个节点的执行数据; 根据每个节点的执行数据判断大部分节点或者全部节点的执行数据是否一致,即判断大部分节点的侵权数据或者全部节点的侵权数据是否一致,若大部分节点的执行数据或者全部节点的执行数据一致,则完成对执行数据的共识,并将得到共识的执行数据确定为取证数据。需要说明的是,侵权客体不同,取证数据也不同,若侵权客体为文章,则取证数据可以包括文章的标题、内容、作者、文章发表在侵权网页中的时间、文章的浏览量等,本示例性实施例对此不做特殊限定。若侵权客体为视频,则取证数据可以包括视频的内容、视频的标题、视频的作者、视频发布在侵权网页上的时间、视频的浏览量等,本示例性实施例对此不做特殊限定。
再例如,若取证标识信息为公布侵权客体的网页所属的网站的链接和客体的基本信息,客体的基本信息可以包括客体的名称、作者等,具体的,若客体为文章,则客体的基本信息包括文章的名称、作者等;若客体为图片,则客体的基本信息可以包括图片的名称、作者等。基于上述取证标识信息,智能合约中包括的取证操作包括:根据公布侵权客体的网页所属的网站的链接获取公布侵权客体的网页所属的网站,并遍历公布侵权客体的网页所属的网站中的每一个链接的网页数据,并将每一个链接的网页数据分别与客体的基本信息进行匹配,并将与客体的基本信息匹配的网页数据确定为侵权数据。基于此,获取取证数据的过程可以包括:区块链调用智能合约,并控制其中的每个节点根据公布侵权客体的网页所属的网站的链接获取公布侵权客体的网页所属的网站,并遍历公布侵权客体的网页所属的网站中的每一个链接的网页数据,将每个节点获取的公布侵权客体的网页所属的网站中的每一个链接的网页数据分别与客体的基本信息进行匹配,并将每个节点获取的公布侵权客体的网页所属的网站中的与客体的基本信息匹配的网页数据确定为对应的每个节点的侵权数据,以及将每个节点的侵权数据确定为对应的每个节点的执行数据。根据每个节点的执行数据判断大部分节点或者全部节点的执行数据是否一致,若大部分节点或者全部节点的执行数据一致,则完成对执行数据的共识,并将得到共识的执行数据确定为取证数据。需要说明的是,取证数据已经在上文中进行了说明,因此此处不在赘述。
步骤S360,对取证数据进行签章,并将签章后的取证数据发送至用户的终端。
在本申请实施例中,在获取到取证数据后,为了避免网络劫持,进一步保证取证数据的可信度。需对取证数据进行签章,具体的签证方式可以为:通过对取证数据加盖区块链证书时间戳的方式对取证数据进行签章;还可以为通过对取证数据加盖一认证标识的方式对取证数据进行签章,其中,认证标识的具体表现形式可以由开发人员自行设置, 例如,认证标识可以为一个二维码图片、还可以为一个由多个字符组成的字符串等,本示例性实施例对此不做特殊限定。需要说明的是,签章的执行主体可以为区块链中的一个节点,或者区块链中的所有节点等,本示例性实施例对此不做特殊限定。需要说明的是,在本公开的其他实施例中,若取证方法的应用场景如图2所示,签章的执行主体除了为区块链中的一个节点或者多有节点等,还可以为代理服务器,本示例性实施例对此不做特殊限定。
为了避免网络劫持,保证签章后的取证数据的安全性,将签章后的取证数据发送至用户的终端可以包括:对签章后的取证数据进行加密处理,以得到加密后的取证数据,并将加密后的取证数据发送至用户的终端。
在本申请实施例中,若取证方法的应用场景如图1所示,则区块链可以通过公钥对签章后的取证数据进行加密处理,以得到加密后的取证数据,并将加密后的取证数据发送至用户的终端,以使用户的终端通过与公钥对应的私钥对加密后的取证数据进行解密处理,以得到解密后的取证数据。
若取证方法的应用场景如图2所示,则区块链可以通过第一公钥对签章后的取证数据进行第一次加密处理,以得到第一次加密后的取证数据,并将第一次加密后的取证数据发送至代理服务器,代理服务器通过第二公钥对第一次加密后的取证数据进行加密处理以得到第二次加密后的取证数据,并将第二次加密后的取证数据发送至用户的终端,用户终端可以依次根据与第二公钥对应的第二私钥和与第一公钥对应的第一私钥对第二次加密后的取证数据进行解密以得到解密后的取证数据。
由上可知,通过对签章后的取证数据进行加密,可以避免网络劫持,保证取证数据的安全性。
综上所述,通过调用区块链上部署的智能合约,控制区块链中的节点根据取证标识信息执行取证操作,以得到相应的取证数据,相比于现有技术,由于未采用公正人员执行网络操作的方式获取取证数据,即未采用人工方式,实现了取证数据的自动获取,大大的缩短了取证时间,提高了取证效率,同时也降低了取证的人力成本;另外,由于调用智能合约控制区块链中的节点根据取证标识信息执行取证操作以得到相应的取证数据,即在智能合约中设置取证操作,并在区块链中运行,避免了人为因素的影响,保证了网络环境的可信度,即必避免了伪造网络链接、伪造网站信息等行为的发生,进而保证了取证数据的可信度;此外,通过对取证数据进行签章,可以避免网络劫持,进一步的保证了取证数据的可信度。
对应上述基于区块链的取证方法,基于相同的思路,本申请实施例还提供了一种基于区块链的取证装置,图4为本说明书一个或多个实施例提供的基于区块链的取证装置的结构框图,如图4所示,基于区块链的取证装置400可以包括:获取模块401、执行模块402以及签章模块403,其中:
获取模块401,可以用于获取用户的网络取证请求,并根据网络取证请求获取取证标识信息;
执行模块402,可以用于调用区块链上部署的智能合约,控制区块链中的节点根据取证标识信息执行取证操作,以得到相应的取证数据;
签章模块403,可以用于对取证数据进行签章,并将签章后的取证数据发送至用户的终端。
可选的,执行模块402可以包括:
调用单元,用于调用智能合约,控制区块链中的各节点根据取证标识信息执行取证操作,以得到各节点的执行数据;以及
共识单元,用于对各节点的执行数据进行共识处理,并将得到共识的执行数据作为取证数据。
可选的,签章模块403,具体用于通过对取证数据加盖区块链证书时间戳的方式对取证数据进行签章。
可选的,获取模块401,具体用于接收用户的终端发送的原始网络取证请求,对原始网络取证请求按照预设格式进行转化,以得到用户的网络取证请求;或者接收代理服务器发送的用户的网络取证请求,用户的网络取证请求由代理服务器根据用户的终端发送的原始网络取证请求转化得到。
可选的,获取模块401,具体用于获取加密后的用户的网络取证请求,对加密后的用户的网络取证请求进行解密,以得到解密后的用户的网络取证请求,以及根据解密后的用户的网络取证请求获取取证标识信息。
可选的,签章模块403,具体用于对签章后的取证数据进行加密处理,以得到加密后的取证数据,并将加密后的取证数据发送至用户的终端。
本申请实施例提供的基于区块链的取证装置,通过调用区块链上部署的智能合约,控制区块链中的节点根据取证标识信息执行取证操作,以得到相应的取证数据,相比于 现有技术,由于未采用公正人员执行网络操作的方式获取取证数据,即未采用人工方式,实现了取证数据的自动获取,大大的缩短了取证时间,提高了取证效率,同时也降低了取证的人力成本;另外,由于调用智能合约控制区块链中的节点根据取证标识信息执行取证操作以得到相应的取证数据,即在智能合约中设置取证操作,并在区块链中运行,避免了人为因素的影响,保证了网络环境的可信度,即必避免了伪造网络链接、伪造网站信息等行为的发生,进而保证了取证数据的可信度;此外,通过对取证数据进行签章,可以避免网络劫持,进一步的保证了取证数据的可信度。
进一步地,基于上述图3所示的方法,本申请实施例还提供了一种基于区块链的取证设备,如图5所示。
基于区块链的取证设备可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上的处理器501和存储器502,存储器502中可以存储有一个或一个以上存储应用程序或数据。其中,存储器502可以是短暂存储或持久存储。存储在存储器502的应用程序可以包括一个或一个以上模块(图示未示出),每个模块可以包括对基于区块链的取证设备中的一系列计算机可执行指令。更进一步地,处理器501可以设置为与存储器502通信,在基于区块链的取证设备上执行存储器502中的一系列计算机可执行指令。基于区块链的取证设备还可以包括一个或一个以上电源503,一个或一个以上有线或无线网络接口504,一个或一个以上输入输出接口505,一个或一个以上键盘506等。
在一个具体的实施例中,基于区块链的取证设备包括有存储器,以及一个或一个以上的程序,其中一个或者一个以上程序存储于存储器中,且一个或者一个以上程序可以包括一个或一个以上模块,且每个模块可以包括对基于区块链的取证设备中的一系列计算机可执行指令,且经配置以由一个或者一个以上处理器执行该一个或者一个以上程序包含用于进行以下计算机可执行指令:
获取用户的网络取证请求,并根据网络取证请求获取取证标识信息;
调用区块链上部署的智能合约,控制区块链中的节点根据取证标识信息执行取证操作,以得到相应的取证数据;
对取证数据进行签章,并将签章后的取证数据发送至用户的终端。
可选的,计算机可执行指令在被执行时,调用区块链上部署的智能合约,控制区块链中的节点根据取证标识信息执行取证操作,以得到相应的取证数据包括:
调用智能合约,控制区块链中的各节点根据取证标识信息执行取证操作,以得到各 节点的执行数据;以及
对各节点的执行数据进行共识处理,并将得到共识的执行数据作为取证数据。
可选的,计算机可执行指令在被执行时,对取证数据进行签章包括:
通过对取证数据加盖区块链证书时间戳的方式对取证数据进行签章。
可选的,计算机可执行指令在被执行时,获取用户的网络取证请求,包括:
接收用户的终端发送的原始网络取证请求,对原始网络取证请求按照预设格式进行转化,以得到用户的网络取证请求;或者
接收代理服务器发送的用户的网络取证请求,用户的网络取证请求由代理服务器根据用户的终端发送的原始网络取证请求转化得到。
可选的,计算机可执行指令在被执行时,获取用户的网络取证请求,并根据网络取证请求获取取证标识信息包括:
获取加密后的用户的网络取证请求,对加密后的用户的网络取证请求进行解密,以得到解密后的用户的网络取证请求;
根据解密后的用户的网络取证请求获取取证标识信息。
可选的,计算机可执行指令在被执行时,将签章后的取证数据发送至用户的终端包括:
对签章后的取证数据进行加密处理,以得到加密后的取证数据,并将加密后的取证数据发送至用户的终端。
本申请实施例提供的基于区块链的取证设备,通过调用区块链上部署的智能合约,控制区块链中的节点根据取证标识信息执行取证操作,以得到相应的取证数据,相比于现有技术,由于未采用公正人员执行网络操作的方式获取取证数据,即未采用人工方式,实现了取证数据的自动获取,大大的缩短了取证时间,提高了取证效率,同时也降低了取证的人力成本;另外,由于调用智能合约控制区块链中的节点根据取证标识信息执行取证操作以得到相应的取证数据,即在智能合约中设置取证操作,并在区块链中运行,避免了人为因素的影响,保证了网络环境的可信度,即必避免了伪造网络链接、伪造网站信息等行为的发生,进而保证了取证数据的可信度;此外,通过对取证数据进行签章,可以避免网络劫持,进一步的保证了取证数据的可信度。
进一步的,本申请实施例还提供了一种存储介质,用于存储计算机可执行指令, 一种具体的实施例中,该存储介质可以为U盘、光盘、硬盘等,该存储介质存储的计算机可执行指令在被处理器执行时,能实现以下流程:
获取用户的网络取证请求,并根据网络取证请求获取取证标识信息;
调用区块链上部署的智能合约,控制区块链中的节点根据取证标识信息执行取证操作,以得到相应的取证数据;
对取证数据进行签章,并将签章后的取证数据发送至用户的终端。
可选的,该存储介质存储的计算机可执行指令在被处理器执行时,调用区块链上部署的智能合约,控制区块链中的节点根据取证标识信息执行取证操作,以得到相应的取证数据包括:
调用智能合约,控制区块链中的各节点根据取证标识信息执行取证操作,以得到各节点的执行数据;以及
对各节点的执行数据进行共识处理,并将得到共识的执行数据作为取证数据。
可选的,该存储介质存储的计算机可执行指令在被处理器执行时,对取证数据进行签章包括:
通过对取证数据加盖区块链证书时间戳的方式对取证数据进行签章。
可选的,该存储介质存储的计算机可执行指令在被处理器执行时,获取用户的网络取证请求,包括:
接收用户的终端发送的原始网络取证请求,对原始网络取证请求按照预设格式进行转化,以得到用户的网络取证请求;或者
接收代理服务器发送的用户的网络取证请求,用户的网络取证请求由代理服务器根据用户的终端发送的原始网络取证请求转化得到。
可选的,该存储介质存储的计算机可执行指令在被处理器执行时,获取用户的网络取证请求,并根据网络取证请求获取取证标识信息包括:
获取加密后的用户的网络取证请求,对加密后的用户的网络取证请求进行解密,以得到解密后的用户的网络取证请求;
根据解密后的用户的网络取证请求获取取证标识信息。
可选的,该存储介质存储的计算机可执行指令在被处理器执行时,将签章后的 取证数据发送至用户的终端包括:
对签章后的取证数据进行加密处理,以得到加密后的取证数据,并将加密后的取证数据发送至用户的终端。
本申请实施例中的存储介质存储的计算机可执行指令在被处理器执行时,通过调用区块链上部署的智能合约,控制区块链中的节点根据取证标识信息执行取证操作,以得到相应的取证数据,相比于现有技术,由于未采用公正人员执行网络操作的方式获取取证数据,即未采用人工方式,实现了取证数据的自动获取,大大的缩短了取证时间,提高了取证效率,同时也降低了取证的人力成本;另外,由于调用智能合约控制区块链中的节点根据取证标识信息执行取证操作以得到相应的取证数据,即在智能合约中设置取证操作,并在区块链中运行,避免了人为因素的影响,保证了网络环境的可信度,即必避免了伪造网络链接、伪造网站信息等行为的发生,进而保证了取证数据的可信度;此外,通过对取证数据进行签章,可以避免网络劫持,进一步的保证了取证数据的可信度。
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language) 与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本说明书一个或多个实施例时可以把各单元的功能在同一个或多个软件和/或硬件中实现。
本领域内的技术人员应明白,本说明书一个或多个实施例可提供为方法、系统、或计算机程序产品。因此,本说明书一个或多个实施例可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本说明书一个或多个实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本说明书一个或多个实施例是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或 方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固 有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括要素的过程、方法、商品或者设备中还存在另外的相同要素。
本说明书一个或多个实施例可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本申请,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
以上仅为本说明书一个或多个实施例而已,并不用于限制本说明书。对于本领域技术人员来说,本说明书一个或多个实施例可以有各种更改和变化。凡在本说明书一个或多个实施例的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本说明书一个或多个实施例的权利要求范围之内。

Claims (9)

  1. 一种基于区块链的取证方法,其特征在于,包括:
    获取用户的网络取证请求,并根据所述网络取证请求获取取证标识信息;
    调用区块链上部署的智能合约,控制所述区块链中的节点根据所述取证标识信息执行取证操作,以得到相应的取证数据;
    对所述取证数据进行签章,并将签章后的所述取证数据发送至所述用户的终端。
  2. 根据权利要求1所述的基于区块链的取证方法,其特征在,所述调用区块链上部署的智能合约,控制所述区块链中的节点根据所述取证标识信息执行取证操作,以得到相应的取证数据包括:
    调用所述智能合约,控制所述区块链中的各节点根据所述取证标识信息执行所述取证操作,以得到各所述节点的执行数据;以及
    对各所述节点的执行数据进行共识处理,并将得到共识的执行数据作为所述取证数据。
  3. 根据权利要求1所述的基于区块链的取证方法,其特征在于,所述对所述取证数据进行签章包括:
    通过对所述取证数据加盖区块链证书时间戳的方式对所述取证数据进行签章。
  4. 根据权利要求1所述的基于区块链的取证方法,其特征在,所述获取用户的网络取证请求,包括:
    接收所述用户的终端发送的原始网络取证请求,对所述原始网络取证请求按照预设格式进行转化,以得到所述用户的网络取证请求;或者
    接收代理服务器发送的所述用户的网络取证请求,所述用户的网络取证请求由所述代理服务器根据所述用户的终端发送的原始网络取证请求转化得到。
  5. 根据权利要求1~4中任一项所述的基于区块链的取证方法,其特征在于,所述获取用户的网络取证请求,并根据所述网络取证请求获取取证标识信息包括:
    获取加密后的用户的网络取证请求,对所述加密后的用户的网络取证请求进行解密,以得到解密后的用户的网络取证请求;
    根据所述解密后的用户的网络取证请求获取取证标识信息。
  6. 根据权利要求1~4中任一项所述的基于区块链的取证方法,其特征在于,所述将签章后的所述取证数据发送至所述用户的终端包括:
    对签章后的所述取证数据进行加密处理,以得到加密后的取证数据,并将所述加密后的取证数据发送至所述用户的终端。
  7. 一种基于区块链的取证装置,其特征在于,包括:
    获取模块,用于获取用户的网络取证请求,并根据所述网络取证请求获取取证标识信息;
    执行模块,用于调用区块链上部署的智能合约,控制所述区块链中的节点根据所述取证标识信息执行取证操作,以得到相应的取证数据;
    签章模块,用于对所述取证数据进行签章,并将签章后的所述取证数据发送至所述用户的终端。
  8. 一种基于区块链的取证设备,其特征在于,包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
    获取用户的网络取证请求,并根据所述网络取证请求获取取证标识信息;
    调用区块链上部署的智能合约,控制所述区块链中的节点根据所述取证标识信息执行取证操作,以得到相应的取证数据;
    对所述取证数据进行签章,并将签章后的所述取证数据发送至所述用户的终端。
  9. 一种存储介质,用于存储计算机可执行指令,其特征在于,所述可执行指令在被执行时实现以下流程:
    获取用户的网络取证请求,并根据所述网络取证请求获取取证标识信息;
    调用区块链上部署的智能合约,控制所述区块链中的节点根据所述取证标识信息执行取证操作,以得到相应的取证数据;
    对所述取证数据进行签章,并将签章后的所述取证数据发送至所述用户的终端。
PCT/CN2019/112659 2018-12-13 2019-10-23 基于区块链的取证方法及装置 WO2020119265A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811527239.9A CN110009336A (zh) 2018-12-13 2018-12-13 基于区块链的取证方法及装置
CN201811527239.9 2018-12-13

Publications (1)

Publication Number Publication Date
WO2020119265A1 true WO2020119265A1 (zh) 2020-06-18

Family

ID=67165135

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/112659 WO2020119265A1 (zh) 2018-12-13 2019-10-23 基于区块链的取证方法及装置

Country Status (3)

Country Link
CN (1) CN110009336A (zh)
TW (1) TW202022677A (zh)
WO (1) WO2020119265A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112153039A (zh) * 2020-09-21 2020-12-29 中国电子科技网络信息安全有限公司 一种基于区块链的数据存证共享方法

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110009336A (zh) * 2018-12-13 2019-07-12 阿里巴巴集团控股有限公司 基于区块链的取证方法及装置
CN110958319B (zh) * 2019-12-05 2022-07-12 腾讯科技(深圳)有限公司 一种基于区块链的侵权存证管理方法及装置
CN111079101B (zh) * 2019-12-20 2020-10-23 支付宝(杭州)信息技术有限公司 基于区块链的侵权取证方法及装置、电子设备、存储介质
CN110851879B (zh) * 2020-01-15 2023-03-21 蚂蚁区块链科技(上海)有限公司 一种基于存证区块链的侵权存证方法、装置及设备
CN111541790B (zh) * 2020-07-10 2020-10-23 北京东方通科技股份有限公司 一种基于区块链的大数据处理方法和系统
CN112235323B (zh) * 2020-12-11 2021-05-07 腾讯科技(深圳)有限公司 基于区块链的取证方法及装置、电子设备和可读存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196900A (zh) * 2017-03-24 2017-09-22 阿里巴巴集团控股有限公司 一种共识校验的方法及装置
CN108512653A (zh) * 2018-04-18 2018-09-07 成都零光量子科技有限公司 一种基于区块链的电子证据采集和服务方法
CN108550037A (zh) * 2018-04-11 2018-09-18 北京知金链网络技术有限公司 基于区块链的文件处理方法和装置
CN108809932A (zh) * 2018-04-09 2018-11-13 杭州拾贝知识产权服务有限公司 一种基于区块链的存证系统、方法及可读介质
CN108920966A (zh) * 2018-06-25 2018-11-30 北京奇虎科技有限公司 一种区块链存证、取证方法及装置
CN110009336A (zh) * 2018-12-13 2019-07-12 阿里巴巴集团控股有限公司 基于区块链的取证方法及装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108959416B (zh) * 2018-06-08 2020-01-10 浙江数秦科技有限公司 一种基于区块链的网页数据自动取证与存证方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196900A (zh) * 2017-03-24 2017-09-22 阿里巴巴集团控股有限公司 一种共识校验的方法及装置
CN108809932A (zh) * 2018-04-09 2018-11-13 杭州拾贝知识产权服务有限公司 一种基于区块链的存证系统、方法及可读介质
CN108550037A (zh) * 2018-04-11 2018-09-18 北京知金链网络技术有限公司 基于区块链的文件处理方法和装置
CN108512653A (zh) * 2018-04-18 2018-09-07 成都零光量子科技有限公司 一种基于区块链的电子证据采集和服务方法
CN108920966A (zh) * 2018-06-25 2018-11-30 北京奇虎科技有限公司 一种区块链存证、取证方法及装置
CN110009336A (zh) * 2018-12-13 2019-07-12 阿里巴巴集团控股有限公司 基于区块链的取证方法及装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112153039A (zh) * 2020-09-21 2020-12-29 中国电子科技网络信息安全有限公司 一种基于区块链的数据存证共享方法
CN112153039B (zh) * 2020-09-21 2022-03-18 中国电子科技网络信息安全有限公司 一种基于区块链的数据存证共享方法

Also Published As

Publication number Publication date
TW202022677A (zh) 2020-06-16
CN110009336A (zh) 2019-07-12

Similar Documents

Publication Publication Date Title
WO2020119265A1 (zh) 基于区块链的取证方法及装置
US11379803B2 (en) Blockchain-based data processing method and device
US9930014B2 (en) Methods and apparatus for key delivery in HTTP live streaming
US8806193B2 (en) Methods and apparatus for integrating digital rights management (DRM) systems with native HTTP live streaming
JP2020510329A (ja) ログイン情報処理の方法およびデバイス
WO2018171539A1 (zh) 一种业务请求的处理方法及装置
US8909933B2 (en) Decoupled cryptographic schemes using a visual channel
US11283778B2 (en) Data exchange system, method and device
TWI709093B (zh) 基於掃碼操作的頁面存取方法、裝置及系統
TWI724473B (zh) 移動終端中共享安全應用的方法及移動終端
CN107277028B (zh) 在应用间传输聊天表情的方法及装置、设备、存储介质
WO2021017424A1 (zh) 数据预处理方法、密文数据获取方法、装置和电子设备
WO2019095854A1 (zh) 可溯源的多方数据处理方法、装置及设备
TW201937425A (zh) 交易處理方法、伺服器、客戶端及系統
CN113746882A (zh) 一种用户会话信息存储方法、装置及电子设备
CN110662089A (zh) 弹幕接收处理方法、存储介质、电子设备及系统
CN108833500B (zh) 服务调用方法、服务提供方法、数据传递方法和服务器
CN107566499B (zh) 数据同步的方法、装置和系统
TWI705345B (zh) 實現數位版權管理的方法、用戶端設備及系統
CN112329044A (zh) 信息获取方法、装置、电子设备和计算机可读介质
CN112100689A (zh) 一种可信数据处理方法、装置及设备
CN115118486B (zh) 物联网系统、基于区块链获取数据的方法和装置、存储介质以及计算设备
JP6755539B2 (ja) ネットワークに著作物を公開するための方法および装置
CN110956349B (zh) 服务质量分析方法、系统、装置、服务器及电子设备
CN110858243A (zh) 用于网关的页面获取方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19896924

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19896924

Country of ref document: EP

Kind code of ref document: A1