CN108881262A - Restoring files methods, devices and systems based on block chain - Google Patents

Restoring files methods, devices and systems based on block chain Download PDF

Info

Publication number
CN108881262A
CN108881262A CN201810707476.7A CN201810707476A CN108881262A CN 108881262 A CN108881262 A CN 108881262A CN 201810707476 A CN201810707476 A CN 201810707476A CN 108881262 A CN108881262 A CN 108881262A
Authority
CN
China
Prior art keywords
file
verified
symmetric key
summary info
storage location
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810707476.7A
Other languages
Chinese (zh)
Inventor
张银霞
王晓康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing MetarNet Technologies Co Ltd
Original Assignee
Beijing MetarNet Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing MetarNet Technologies Co Ltd filed Critical Beijing MetarNet Technologies Co Ltd
Priority to CN201810707476.7A priority Critical patent/CN108881262A/en
Publication of CN108881262A publication Critical patent/CN108881262A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present invention provides the restoring files methods, devices and systems based on block chain.Wherein, method includes:According to the block in block chain, the storage location of the first summary info and file to be verified and the ciphertext of symmetric key are obtained;The storage location of file to be verified and the ciphertext of symmetric key are decrypted according to the private key of itself, obtain the storage location and symmetric key of file to be verified;File to be verified is obtained according to the storage location of file to be verified, file to be verified is decrypted according to symmetric key, and according to second summary info of file acquisition to be verified after digest algorithm and decryption;First summary info and the second summary info are compared, the verification result of file to be verified is obtained according to comparing result;If verification result is to be proved to be successful, file to be verified is received.Restoring files methods, devices and systems provided in an embodiment of the present invention based on block chain, can improve the efficiency of the cross-domain circulation of file.

Description

Restoring files methods, devices and systems based on block chain
Technical field
The present embodiments relate to field of computer technology, more particularly to the restoring files method, apparatus based on block chain And system.
Background technique
Along with the tide of Informatization Development, digital office has become the most basic IT hand of government and enterprises and institutions Section.The construction of the intelligent IT information such as smart city, E-Government, generates a large amount of electron number between government and enterprises and institutions It according to transmission, needs to get through between enterprises and institutions, between government department, the data sharing chain between government and enterprises and institutions It connects, realizes cross-domain restoring files.
For example, often there is the contact of official document business between enterprise A and law court, enterprise A usually monthly submits primary electron material To law court, using just carrying out accepting verifying after a period of time, the time is longer for law court, and enterprise A, which is often queried by law court, to be accepted Electronic material and the electronic material initially submitted are inconsistent, and the dispute of both sides needs the long period to handle and coordinate.
For another example, it when patient transfers from one hospital to another, in order to reduce the financial burden of patient and avoid the wasting of resources, is transferred to hospital and usually needs It produces hospital and the inspection result of patient is provided, inspection result saves usually in the form of electronic document, and it is also usually right to be transferred to hospital The inspection result for producing hospital's offer, which exists, to be queried, and the query of both sides needs the long period to handle and coordinate.
In existing electronic document exchange, it is difficult to be verified to whether electronic document is tampered, it is difficult to guarantee restoring files Safety.
Summary of the invention
For the lower problem of the efficiency of cross-domain restoring files of the existing technology, the embodiment of the present invention, which provides, is based on area The restoring files methods, devices and systems of block chain.
According to the first aspect of the invention, the embodiment of the present invention provides a kind of restoring files method based on block chain, packet It includes:
According to the block in block chain, the storage location of the first summary info and file to be verified and symmetrical close is obtained The ciphertext of key;
The storage location of file to be verified and the ciphertext of symmetric key are decrypted according to the private key of itself, obtained to be tested Demonstrate,prove the storage location and symmetric key of file;
File to be verified is obtained according to the storage location of the file to be verified, according to the symmetric key to text to be verified Part is decrypted, and according to second summary info of file acquisition to be verified after digest algorithm and decryption;
First summary info and second summary info are compared, obtained according to comparing result described to be tested Demonstrate,prove the verification result of file;
If verification result is to be proved to be successful, the file to be verified is received;
Wherein, first summary info is that transmitting terminal is believed according to the abstract that the digest algorithm and original document obtain Breath.
According to the second aspect of the invention, the embodiment of the present invention provides a kind of restoring files method based on block chain, packet It includes:
Symmetric key is generated, original document is encrypted according to the symmetric key, encrypted original document is deposited On storage to file server;
Obtain the first summary info according to digest algorithm and original document, and according to the public key of receiving end to the encryption after Original document storage location and the symmetric key encrypted, obtain the storage location of the encrypted original document With the ciphertext of the symmetric key;
According to the storage location and the symmetric key of first summary info and the encrypted original document Ciphertext, generate block simultaneously the block is added in block chain;So that receiving end according to the block, obtains described the The ciphertext of the storage location and symmetric key of one summary info and file to be verified;According to the private key of receiving end to it is described to The storage location and the ciphertext of symmetric key for verifying file are decrypted, and obtain the storage location of file to be verified and symmetrical close Key;Obtain file to be verified according to the storage location of the file to be verified, according to the symmetric key to file to be verified into Row decryption, and according to second summary info of file acquisition to be verified after digest algorithm and decryption;By first summary info It is compared with second summary info, the verification result of the file to be verified is obtained according to comparing result;If verifying knot Fruit is to be proved to be successful, then receives the file to be verified.
According to the third aspect of the invention we, the embodiment of the present invention provides a kind of reception of restoring files based on block chain End, including:
Data acquisition module, for according to the block in block chain, obtaining the first summary info and file to be verified The ciphertext of storage location and symmetric key;
First deciphering module, for the private key according to itself to the storage location of file to be verified and the ciphertext of symmetric key It is decrypted, obtains the storage location and symmetric key of file to be verified;
Second deciphering module, for obtaining file to be verified according to the storage location of the file to be verified, according to described File to be verified is decrypted in symmetric key, and is made a summary and believed according to the file acquisition to be verified second after digest algorithm and decryption Breath;
File verification module, for comparing first summary info and second summary info, according to right Than the verification result that result obtains the file to be verified;
File reception module receives the file to be verified if being to be proved to be successful for verification result;
Wherein, first summary info is that transmitting terminal is believed according to the abstract that the digest algorithm and original document obtain Breath.
According to the fourth aspect of the invention, the embodiment of the present invention provides a kind of reception of restoring files based on block chain End, including:
File preserving module encrypts original document according to the symmetric key for generating symmetric key, will add Original document after close is stored to file server;
Data encryption module, for obtaining the first summary info according to digest algorithm and original document, and according to receiving end Public key the storage location of the encrypted original document and the symmetric key are encrypted, obtain it is described encrypted The ciphertext of the storage location of original document and the symmetric key;
Data cochain module, for the storage according to first summary info and the encrypted original document The ciphertext of position and the symmetric key generates block and the block is added in block chain;So that receiving end according to The block obtains the storage location of first summary info and file to be verified and the ciphertext of symmetric key;According to connecing The storage location of the file to be verified and the ciphertext of symmetric key is decrypted in the private key of receiving end, obtains file to be verified Storage location and symmetric key;File to be verified is obtained according to the storage location of the file to be verified, according to described symmetrical close File to be verified is decrypted in key, and according to second summary info of file acquisition to be verified after digest algorithm and decryption;It will First summary info and second summary info compare, and obtain testing for the file to be verified according to comparing result Demonstrate,prove result;If verification result is to be proved to be successful, the file to be verified is received.
According to the fifth aspect of the invention, the embodiment of the present invention provides a kind of restoring files dress system based on block chain, Including:The transmitting terminal of the receiving end of the above-mentioned restoring files based on block chain and the above-mentioned restoring files based on block chain.
According to the sixth aspect of the invention, the embodiment of the present invention provides a kind of electronic equipment, including:
At least one processor;And
At least one processor being connect with the processor communication, wherein:
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to refer to It enables and is able to carry out the embodiment of the present invention based on the method and its all optional realities for receiving end side in the restoring files method of block chain The method for applying example.
According to the seventh aspect of the invention, the embodiment of the present invention provides a kind of electronic equipment, including:
At least one processor;And
At least one processor being connect with the processor communication, wherein:
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to refer to It enables and is able to carry out the embodiment of the present invention based on the method and its all optional realities for sending end side in the restoring files method of block chain The method for applying example.
According to the eighth aspect of the invention, the embodiment of the present invention provides a kind of non-transient computer readable storage medium, institute Non-transient computer readable storage medium storage computer instruction is stated, the computer instruction makes the computer execute the present invention Method of the embodiment based on the method and its all alternative embodiments for receiving end side in the restoring files method of block chain.
According to the ninth aspect of the invention, the embodiment of the present invention provides a kind of non-transient computer readable storage medium, institute Non-transient computer readable storage medium storage computer instruction is stated, the computer instruction makes the computer execute the present invention Method of the embodiment based on the method and its all alternative embodiments for sending end side in the restoring files method of block chain.
Restoring files methods, devices and systems provided in an embodiment of the present invention based on block chain are based on block chain technology Combining cipher technology carries out restoring files, realizes that cross-domain data really weigh, circulate and anti-tamper, solve cross-domain data circulate with Shared existing information really weigh, the problem that information privacy and information are anti-tamper, can improve the efficiency of the cross-domain circulation of file, raising across The office efficiency in domain.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow chart of restoring files method of the embodiment of the present invention based on block chain;
Fig. 2 is the flow chart of restoring files method of the embodiment of the present invention based on block chain;
Fig. 3 is the functional block diagram of the receiving end of restoring files of the embodiment of the present invention based on block chain;
Fig. 4 is the functional block diagram of the transmitting terminal of restoring files of the embodiment of the present invention based on block chain;
Fig. 5 is the functional block diagram of restoring files system of the embodiment of the present invention based on block chain;
Fig. 6 is the structural block diagram of electronic equipment of the embodiment of the present invention;
Fig. 7 is the structural block diagram of electronic equipment of the embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
In order to overcome the above problem of the prior art, the embodiment of the present invention provides a kind of restoring files side based on block chain Method, inventive concept are that the anti-tamper characteristic of effective use block chain carries out the circulation and verifying of file, guarantee that receiving end obtains File it is identical as the file that transmitting terminal is sent, guarantee the safety of restoring files.File refers to electronic document, including digitlization The electronic documents such as official document, medical examination result.
Block chain is that the computer technologies such as Distributed Storage, point-to-point transmission, common recognition mechanism, cryptographic algorithm are interconnecting The innovation and application mode in net epoch.Block chain is a kind of without intermediary's participation, also can be in mutual mistrust or the participant of weak trust Between maintain it is a set of can not distort account book record technology.Understand from " block chain " these three words, block is exactly one section The information (including data/code) produced in time is packaged into a block, covers timestamp, the hash head with a upper block Linking, the head per next block all contain the index data/hash data an of block, then write in this block Enter new information, to form new block, ending is connected, and constitutes a chain, as block chain.
Each embodiment to facilitate the understanding of the present invention, first to the file provided in an embodiment of the present invention based on block chain The application environment of circulation method is illustrated.
Restoring files method provided in an embodiment of the present invention based on block chain is related to the sender of file, file connects Debit and block platform chain.The sender of file and recipient constitute the alliance in block chain, therefore, institute in the embodiment of the present invention Based on block chain be alliance's chain.The receiving end that transmitting terminal that sender uses, recipient use is block chain node.
Sender by the document transmitting system that is mounted on transmitting terminal, using the related data of file data and file as Block is added in block chain.Block is added to the process in block chain, is known as writing chain or cochain.The block of addition, also referred to as To write chain data.
For example, sender realizes the number of official document by existing official document system (office automation system) when file is official document Word, realize official document by draft-》Audit-》Sign and issue-》Red chromatography-》Registration-》Distribution-》The entire flow of message in-coming.In official document link, The related data of DOC DATA and official document is submitted to block platform chain, realizes cochain.
Recipient is obtained from block chain by installation file reception system on the receive side and writes chain data, and to writing chain It data and is verified from the file data obtained in chain data is write, receives the file being proved to be successful, complete restoring files.
By TLS/SSL guarantee file related data transmission safety, in conjunction with block platform chain multi-channel data every The system of disembarking realizes the data isolation in different business subnet.
Fig. 1 is the flow chart of restoring files method of the embodiment of the present invention based on block chain.As shown in Figure 1, one kind is based on The restoring files method of block chain includes:Step S101, according to the block in block chain, the first summary info is obtained, and to Verify the storage location of file and the ciphertext of symmetric key;Wherein, the first summary info is transmitting terminal according to digest algorithm and original The summary info of beginning file acquisition.
It should be noted that the executing subject of the restoring files method provided in an embodiment of the present invention based on block chain, is Receiving end in restoring files system based on block chain.
It after transmitting terminal is encrypted original document by symmetric key, is sent on file server, and by generation Block is added in block chain.File server, for storing encrypted original document.Original document is not directly to send out It circulates between sending end and receiving end, original document circulates between transmitting terminal and receiving end, is realized by file server transfer.
Symmetric key encryption is called private key encryption, that is, the both sides for sending and receiving data must use identical key pair Operation is encrypted and decrypted in plain text.Symmetric key encryption algorithm mainly includes:DES,3DES,IDEA,FEAL,BLOWFISH Deng.
Block includes clear data and ciphertext data.Clear data includes the first summary info;Ciphertext data include encryption The storage location of above-mentioned encrypted original document afterwards and encrypted symmetric key.
When storage location and symmetric key to encrypted original document encrypt, be all made of the public key of receiving end into Row encryption.
After transmitting terminal is encrypted original document by symmetric key, according to digest algorithm to encrypted original document Operation is carried out, the first summary info is obtained.
Digest algorithm refers to Message Digest 5.The ciphering process that is mainly characterized by of Message Digest 5 does not need key, and And the data by encryption can not be decrypted, only inputting identical clear data could obtain by identical Message Digest 5 To identical ciphertext.The management and distribution problem of key is not present in Message Digest 5, is suitable for using on distributed network.
Message Digest 5 mainly includes three classes:MD (eap-message digest, Message Digest), SHA (secure hash, Secure Hash Algorithm), MAC (message authentication code, Message Authentication Code).
The summary info that MD algorithm generates all is 128, including:MD2,MD4,MD5.
SHA algorithm generates regular length summary info, including:SHA-1, SHA-2 (SHA-224, SHA-256, SHA-384, SHA-512).The length of summary info that SHA-1, SHA-224, SHA-256, SHA-384, SHA-512 algorithm generate is respectively 160,224,256,384,512.
It is commonly HMAC (the hash function algorithm containing key, keyed-Hash Message in MAC algorithm Authentication Code).Hmac algorithm contains two serial Message Digest 5s of MD and SHA, only original Key is added on the basis of MD and SHA algorithm.Hmac algorithm has merged MD, SHA, including:HmacMD2,HmacMD4, HmacMD5、HmacSHA1、HmacSHA224、HmacSHA256、HmacSHA384、HmacSHA512。
Preferably, operation is carried out to original document using SHA-256 algorithm, obtains the first summary info.
The storage location of above-mentioned encrypted original document, the file server including the encrypted original document of storage The store path of address and encrypted original document on this document server.
Receiving end obtains the first summary info according to the block in block chain from the clear data that block includes, from area The storage location of file and the ciphertext of symmetric key are obtained in the ciphertext data that block includes.Since receiving end is according to the storage of file After position obtains file, also the file of acquisition is verified, judge whether is original document that this document and transmitting terminal are sent Identical, therefore, the storage location that receiving end obtains file is the storage location of file to be verified.
Step S102, the storage location of file to be verified and the ciphertext of symmetric key are solved according to the private key of itself It is close, obtain the storage location and symmetric key of file to be verified.
After obtaining the storage location of file to be verified and the ciphertext of symmetric key, receiving end is according to the private key of receiving end itself The ciphertext of storage location and symmetric key to file to be verified is decrypted, and obtains the storage location of file to be verified and symmetrical Key.
Since the storage location of file in block and the ciphertext of symmetric key after the public key encryption of receiving end using obtaining, Therefore, only using encryption when the private key of the corresponding receiving end of public key that uses, could be successfully to the storage location of file and right The ciphertext of key is claimed to be decrypted, to realize the control of file access permission.
Such as:Ciphertext data in block are obtained after public key encryption according to receiving end A, and receiving end A obtains ciphertext After data, successfully the ciphertext data could be decrypted according to the private key of receiving end A;After receiving end B obtains ciphertext data, root The ciphertext data are decrypted according to the private key of receiving end B, then can decrypt and fail.
Step S103, file to be verified is obtained according to the storage location of file to be verified, according to symmetric key to be verified File is decrypted, and according to second summary info of file acquisition to be verified after digest algorithm and decryption.
After the storage location and the symmetric key that obtain file to be verified, first according to the storage location of file to be verified, from this Storage location obtains file to be verified;Since what is stored on file server is encrypted original document, if original document It is not tampered with, it is the file that do not decrypt that receiving end is obtained from file server, after obtaining file to be verified, according to symmetrical close File to be verified is decrypted in key, thus the file to be verified after being decrypted.
After file to be verified after being decrypted, according to the digest algorithm used when obtaining the first summary info with server-side Identical digest algorithm carries out operation to the file to be verified after decryption, obtains the second summary info.
Step S104, the first summary info and the second summary info are compared, is obtained according to comparing result to be verified The verification result of file.
By digest algorithm carry out the second summary info that after operation obtains the second summary info, operation is obtained with from area The first summary info obtained in the clear data of block compares.
If comparison knows that the first summary info is different from the second summary info, the file on supporting paper server is usurped Change, the file to be verified that receiving end obtains not is the original document that transmitting terminal is sent, and verification result is authentication failed.
If comparison knows that the first summary info is identical as the second summary info, the file on supporting paper server is not usurped Change, the file to be verified that receiving end obtains is identical as the original document that transmitting terminal is sent, and verification result is to be proved to be successful.
If step S105, verification result is to be proved to be successful, file to be verified is received.
When verification result is to be proved to be successful, file to be verified is exactly original document, and receiving end receives file to be verified, i.e., Receiving end receives original document, realizes successful circulation of the original document from transmitting terminal to receiving end.
The embodiment of the present invention be based on block chain technology combining cipher technology carry out restoring files, realize cross-domain data really weigh, Circulation and anti-tamper, solve cross-domain data circulation and shared existing information really weigh, information privacy and information it is anti-tamper Problem can improve the efficiency of the cross-domain circulation of file, improve cross-domain office efficiency.
Content based on the above embodiment further includes after obtaining the verification result of file to be verified according to comparing result: The reason of if verification result is authentication failed, obtains authentication failed, and handled accordingly according to being determined the reason of authentication failed Method.
Specifically, when the verification result for the file to be verified that step S104 is obtained is authentication failed, authentication failed is obtained Reason, and it is directed to different reasons, determine corresponding processing method.
For example, when being system exception when the reason of the authentication failed, processing method be suggestion receiving end user again into Row manual verification;When being tampered for original document the reason of authentication failed, processing method is to suggest the user couple of receiving end The exception of file to be verified is checked, to take further operation according to the result checked.
Fig. 2 is the flow chart of restoring files method of the embodiment of the present invention based on block chain.Based on the above embodiment interior Hold, as shown in Fig. 2, a kind of restoring files method based on block chain includes:Step S201, symmetric key is generated, according to symmetrical Key pair original document is encrypted, and encrypted original document is stored to file server.
It should be noted that the executing subject of the restoring files method provided in an embodiment of the present invention based on block chain, is Transmitting terminal in restoring files system based on block chain.
Before sending original document, symmetric key is temporarily generated, original document is encrypted according to symmetric key, and will Encrypted be sent on file server is stored.
Step S202, the first summary info is obtained according to digest algorithm and original document, and according to the public key pair of receiving end The storage location and symmetric key of encrypted original document are encrypted, obtain encrypted original document storage location and The ciphertext of symmetric key.
After original document is encrypted by symmetric key, encrypted original document is transported according to digest algorithm It calculates, obtains the first summary info.
For the storage location and symmetric key of encrypted original document, encrypted according to the public key of receiving end, it is raw At the storage location of encrypted original document and the ciphertext of symmetric key.
Step S203, according to the storage location and symmetric key of the first summary info and encrypted original document Ciphertext generates block and block is added in block chain;So that receiving end obtains the first summary info according to block, with And file to be verified storage location and symmetric key ciphertext;According to the private key of receiving end to the storage location of file to be verified It is decrypted with the ciphertext of symmetric key, obtains the storage location and symmetric key of file to be verified;According to file to be verified Storage location obtains file to be verified, file to be verified is decrypted according to symmetric key, and according to digest algorithm and decryption Second summary info of file acquisition to be verified afterwards;First summary info and the second summary info are compared, according to comparison As a result the verification result of file to be verified is obtained;If verification result is to be proved to be successful, file to be verified is received.
It, will after obtaining the storage location of the first summary info and encrypted original document and the ciphertext of symmetric key Clear data of first summary info as block makees the storage location of encrypted original document and the ciphertext of symmetric key For the ciphertext data of block, and clear data and ciphertext data group are become into block, to generate block and be added to block In block chain.
After block is added in block chain, receiving end can obtain the first summary info and file to be verified according to block Storage location and symmetric key ciphertext;It obtains after the storage location of file to be verified and the ciphertext of symmetric key according to reception The storage location of file to be verified and the ciphertext of symmetric key is decrypted in the private key at end, obtains the storage position of file to be verified It sets and symmetric key;After the storage location and the symmetric key that obtain file to be verified, obtained according to the storage location of file to be verified File to be verified is taken, and file to be verified is decrypted according to symmetric key, the file to be verified after being decrypted;It is solved After file to be verified after close, according to second summary info of file acquisition to be verified after digest algorithm and decryption;Obtain second After summary info, the first summary info and the second summary info are compared, file to be verified is obtained according to comparing result Verification result;If verification result is to be proved to be successful, file to be verified is received.
The embodiment of the present invention be based on block chain technology combining cipher technology carry out restoring files, realize cross-domain data really weigh, Circulation and anti-tamper, solve cross-domain data circulation and shared existing information really weigh, information privacy and information it is anti-tamper Problem can improve the efficiency of the cross-domain circulation of file, improve cross-domain office efficiency.
Fig. 3 is the functional block diagram of the receiving end of restoring files of the embodiment of the present invention based on block chain.Based on above-mentioned implementation The content of example, as shown in figure 3, a kind of receiving end of the restoring files based on block chain includes:Data acquisition module 301, is used for According to the block in block chain, the storage location of the first summary info and file to be verified and the ciphertext of symmetric key are obtained; First deciphering module 302, for being carried out according to the private key of itself to the storage location of file to be verified and the ciphertext of symmetric key Decryption, obtains the storage location and symmetric key of file to be verified;Second deciphering module 303, for according to file to be verified Storage location obtains file to be verified, file to be verified is decrypted according to symmetric key, and according to digest algorithm and decryption Second summary info of file acquisition to be verified afterwards;File verification module 304, for believing the first summary info and the second abstract Breath compares, and the verification result of file to be verified is obtained according to comparing result;File reception module 305, if for verifying knot Fruit is to be proved to be successful, then receives file to be verified;Wherein, the first summary info is transmitting terminal according to digest algorithm and original document The summary info of acquisition.
The device of restoring files provided in an embodiment of the present invention based on block chain is receiving end, of the invention real for executing Apply the method that end side is provided in the restoring files method based on block chain of example offer, the reception of the restoring files based on block chain Each module that end includes realizes that the specific method of corresponding function and process are detailed in the above-mentioned restoring files method based on block chain The embodiment of the method for end side is received, details are not described herein again.
The embodiment of the present invention be based on block chain technology combining cipher technology carry out restoring files, realize cross-domain data really weigh, Circulation and anti-tamper, solve cross-domain data circulation and shared existing information really weigh, information privacy and information it is anti-tamper Problem can improve the efficiency of the cross-domain circulation of file, improve cross-domain office efficiency.
Fig. 4 is the functional block diagram of the transmitting terminal of restoring files of the embodiment of the present invention based on block chain.Based on above-mentioned implementation The content of example, as shown in figure 4, a kind of transmitting terminal of the restoring files based on block chain includes:File preserving module 401, is used for Symmetric key is generated, original document is encrypted according to symmetric key, encrypted original document is stored to file service On device;Data encryption module 402, for obtaining the first summary info according to digest algorithm and original document, and according to receiving end Public key the storage location and symmetric key of encrypted original document are encrypted, obtain depositing for encrypted original document Storage space sets the ciphertext with symmetric key;Data cochain module 403, for according to the first summary info and encrypted original The storage location of file and the ciphertext of symmetric key generate block and block are added in block chain;So that receiving end root According to block, the storage location of the first summary info and file to be verified and the ciphertext of symmetric key are obtained;According to receiving end The storage location of file to be verified and the ciphertext of symmetric key is decrypted in private key, obtain file to be verified storage location and Symmetric key;File to be verified is obtained according to the storage location of file to be verified, file to be verified is carried out according to symmetric key Decryption, and according to second summary info of file acquisition to be verified after digest algorithm and decryption;By the first summary info and second Summary info compares, and the verification result of file to be verified is obtained according to comparing result;If verification result is to be proved to be successful, Receive file to be verified.
The device of restoring files provided in an embodiment of the present invention based on block chain is transmitting terminal, of the invention real for executing Apply the method that end side is provided in the restoring files method based on block chain of example offer, the reception of the restoring files based on block chain Each module that end includes realizes that the specific method of corresponding function and process are detailed in the above-mentioned restoring files method based on block chain The embodiment of the method for end side is sent, details are not described herein again.
The embodiment of the present invention be based on block chain technology combining cipher technology carry out restoring files, realize cross-domain data really weigh, Circulation and anti-tamper, solve cross-domain data circulation and shared existing information really weigh, information privacy and information it is anti-tamper Problem can improve the efficiency of the cross-domain circulation of file, improve cross-domain office efficiency.
Fig. 5 is the functional block diagram of restoring files system of the embodiment of the present invention based on block chain.It is a kind of based on block chain Restoring files system includes the receiving end 501 of the restoring files based on block chain and the receiving end of the restoring files based on block chain 502。
501 function of receiving end of restoring files based on block chain is referring in particular to receiving end embodiment, based on block chain 501 function of receiving end of restoring files is referring in particular to transmitting terminal embodiment.
Fig. 6 is the structural block diagram of electronic equipment of the embodiment of the present invention.Content based on the above embodiment, as shown in fig. 6, one Planting electronic equipment includes:Processor (processor) 601, memory (memory) 602 and bus 603;Wherein, processor 601 Mutual communication is completed by bus 603 with memory 602;Processor 601 is for calling the program in memory 602 to refer to It enables, to execute method provided by above-mentioned each method embodiment, for example including:Restoring files method based on block chain;According to Block in block chain obtains the side of the ciphertext of the storage location and symmetric key of the first summary info and file to be verified Method;Obtain the storage location of file to be verified and the method for symmetric key;The method that file to be verified is decrypted;Obtain second The method of summary info;The method etc. for obtaining the verification result of file to be verified.
Another embodiment of the present invention discloses a kind of computer program product, and computer program product is non-transient including being stored in Computer program on computer readable storage medium, computer program include program instruction, when program instruction is held by computer When row, computer is able to carry out method provided by above-mentioned each method embodiment, for example including:Restoring files based on block chain Method;According to the block in block chain, the storage location and symmetric key of the first summary info and file to be verified are obtained The method of ciphertext;Obtain the storage location of file to be verified and the method for symmetric key;The method that file to be verified is decrypted; The method for obtaining the second summary info;The method etc. for obtaining the verification result of file to be verified.
Another embodiment of the present invention provides a kind of non-transient computer readable storage medium, non-transient computer readable storages Medium storing computer instruction, computer instruction makes computer execute method provided by above-mentioned each method embodiment, such as wraps It includes:Restoring files method based on block chain;According to the block in block chain, the first summary info and text to be verified are obtained The method of the ciphertext of the storage location and symmetric key of part;Obtain the storage location of file to be verified and the method for symmetric key; The method that file to be verified is decrypted;The method for obtaining the second summary info;Obtain the side of the verification result of file to be verified Method etc..
Fig. 7 is the structural block diagram of electronic equipment of the embodiment of the present invention.Content based on the above embodiment, as shown in fig. 7, one Planting electronic equipment includes:Processor (processor) 701, memory (memory) 702 and bus 703;Wherein, processor 701 Mutual communication is completed by bus 703 with memory 702;Processor 701 is for calling the program in memory 702 to refer to It enables, to execute method provided by above-mentioned each method embodiment, for example including:Restoring files method based on block chain;It generates The method of symmetric key;The method that original document is encrypted;The method for storing encrypted original document;First is obtained to pluck The method for wanting information;The storage location and symmetric key of encrypted original document are encrypted, obtained encrypted original The method of the ciphertext of the storage location and symmetric key of file;According to the first summary info and encrypted original document The ciphertext of storage location and symmetric key generates block and block is added to the method etc. in block chain.
Another embodiment of the present invention discloses a kind of computer program product, and computer program product is non-transient including being stored in Computer program on computer readable storage medium, computer program include program instruction, when program instruction is held by computer When row, computer is able to carry out method provided by above-mentioned each method embodiment, for example including:Restoring files based on block chain Method;The method for generating symmetric key;The method that original document is encrypted;The method for storing encrypted original document; The method for obtaining the first summary info;The storage location and symmetric key of encrypted original document are encrypted, added The method of the ciphertext of the storage location and symmetric key of original document after close;According to the first summary info and encrypted The storage location of original document and the ciphertext of symmetric key generate block and block are added to the method etc. in block chain.
Another embodiment of the present invention provides a kind of non-transient computer readable storage medium, non-transient computer readable storages Medium storing computer instruction, computer instruction makes computer execute method provided by above-mentioned each method embodiment, such as wraps It includes:Restoring files method based on block chain;The method for generating symmetric key;The method that original document is encrypted;Storage The method of encrypted original document;The method for obtaining the first summary info;To the storage location of encrypted original document and Symmetric key is encrypted, the method for obtaining the storage location of encrypted original document and the ciphertext of symmetric key;According to The ciphertext of the storage location and symmetric key of one summary info and encrypted original document generates block and adds block Add to the method etc. in block chain.
The apparatus embodiments described above are merely exemplary, wherein unit can be as illustrated by the separation member Or may not be and be physically separated, component shown as a unit may or may not be physical unit, i.e., It can be located in one place, or may be distributed over multiple network units.It can select according to the actual needs therein Some or all of the modules achieves the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creative labor In the case where dynamic, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should Computer software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including several fingers It enables and using so that computer equipment (can be personal computer, server or the network equipment an etc.) execution is above-mentioned each The method of certain parts of embodiment or embodiment.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that:It still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (10)

1. a kind of restoring files method based on block chain, which is characterized in that including:
According to the block in block chain, the storage location and symmetric key of the first summary info and file to be verified are obtained Ciphertext;
The storage location of file to be verified and the ciphertext of symmetric key are decrypted according to the private key of itself, obtain text to be verified The storage location and symmetric key of part;
Obtain file to be verified according to the storage location of the file to be verified, according to the symmetric key to file to be verified into Row decryption, and according to second summary info of file acquisition to be verified after digest algorithm and decryption;
First summary info and second summary info are compared, the text to be verified is obtained according to comparing result The verification result of part;
If verification result is to be proved to be successful, the file to be verified is received;
Wherein, first summary info is the summary info that transmitting terminal is obtained according to the digest algorithm and original document.
2. the restoring files method according to claim 1 based on block chain, which is characterized in that obtained according to comparing result Further include after the verification result of file to be verified:
The reason of if verification result is authentication failed, obtains authentication failed, and phase is determined according to the reason of authentication failed The processing method answered.
3. a kind of restoring files method based on block chain, which is characterized in that including:
Generate symmetric key, original document is encrypted according to the symmetric key, by encrypted original document store to On file server;
The first summary info is obtained according to digest algorithm and original document, and according to the public key of receiving end to the encrypted original The storage location of beginning file and the symmetric key are encrypted, and storage location and the institute of the encrypted original document are obtained State the ciphertext of symmetric key;
According to the close of the storage location and the symmetric key of first summary info and the encrypted original document Text generates block and the block is added in block chain;So that receiving end obtains described first and plucks according to the block Want the storage location of information and file to be verified and the ciphertext of symmetric key;According to the private key of receiving end to described to be verified The storage location of file and the ciphertext of symmetric key are decrypted, and obtain the storage location and symmetric key of file to be verified;Root File to be verified is obtained according to the storage location of the file to be verified, file to be verified is solved according to the symmetric key It is close, and according to second summary info of file acquisition to be verified after digest algorithm and decryption;By first summary info and institute It states the second summary info to compare, the verification result of the file to be verified is obtained according to comparing result;If verification result is It is proved to be successful, then receives the file to be verified.
4. a kind of receiving end of the restoring files based on block chain, which is characterized in that including:
Data acquisition module, for obtaining the storage of the first summary info and file to be verified according to the block in block chain The ciphertext of position and symmetric key;
First deciphering module, for being carried out according to the private key of itself to the storage location of file to be verified and the ciphertext of symmetric key Decryption, obtains the storage location and symmetric key of file to be verified;
Second deciphering module, for obtaining file to be verified according to the storage location of the file to be verified, according to described symmetrical Key pair file to be verified is decrypted, and according to second summary info of file acquisition to be verified after digest algorithm and decryption;
File verification module is tied for comparing first summary info and second summary info according to comparison Fruit obtains the verification result of the file to be verified;
File reception module receives the file to be verified if being to be proved to be successful for verification result;
Wherein, first summary info is the summary info that transmitting terminal is obtained according to the digest algorithm and original document.
5. a kind of transmitting terminal of the restoring files based on block chain, which is characterized in that including:
File preserving module encrypts original document according to the symmetric key, after encryption for generating symmetric key Original document store to file server;
Data encryption module, for obtaining the first summary info according to digest algorithm and original document, and according to the public affairs of receiving end Key encrypts the storage location of the encrypted original document and the symmetric key, obtains described encrypted original The ciphertext of the storage location of file and the symmetric key;
Data cochain module, for the storage location according to first summary info and the encrypted original document With the ciphertext of the symmetric key, generates block and the block is added in block chain;So that receiving end is according to Block obtains the storage location of first summary info and file to be verified and the ciphertext of symmetric key;According to receiving end Private key the storage location of the file to be verified and the ciphertext of symmetric key are decrypted, obtain the storage of file to be verified Position and symmetric key;File to be verified is obtained according to the storage location of the file to be verified, according to the symmetric key pair File to be verified is decrypted, and according to second summary info of file acquisition to be verified after digest algorithm and decryption;It will be described First summary info and second summary info compare, and the verifying knot of the file to be verified is obtained according to comparing result Fruit;If verification result is to be proved to be successful, the file to be verified is received.
6. a kind of restoring files system based on block chain, which is characterized in that including being based on block chain as claimed in claim 4 Restoring files receiving end and the restoring files as claimed in claim 5 based on block chain receiving end.
7. a kind of electronic equipment, which is characterized in that including:
At least one processor;And
At least one processor being connect with the processor communication, wherein:
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to instruct energy It enough executes method according to claim 1 or 2.
8. a kind of electronic equipment, which is characterized in that including:
At least one processor;And
At least one processor being connect with the processor communication, wherein:
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to instruct energy Enough execute method as claimed in claim 3.
9. a kind of non-transient computer readable storage medium, which is characterized in that the non-transient computer readable storage medium is deposited Computer instruction is stored up, it is method according to claim 1 or 2 that the computer instruction executes the computer.
10. a kind of non-transient computer readable storage medium, which is characterized in that the non-transient computer readable storage medium is deposited Computer instruction is stored up, the computer instruction makes the computer execute method as claimed in claim 3.
CN201810707476.7A 2018-07-02 2018-07-02 Restoring files methods, devices and systems based on block chain Pending CN108881262A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810707476.7A CN108881262A (en) 2018-07-02 2018-07-02 Restoring files methods, devices and systems based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810707476.7A CN108881262A (en) 2018-07-02 2018-07-02 Restoring files methods, devices and systems based on block chain

Publications (1)

Publication Number Publication Date
CN108881262A true CN108881262A (en) 2018-11-23

Family

ID=64298070

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810707476.7A Pending CN108881262A (en) 2018-07-02 2018-07-02 Restoring files methods, devices and systems based on block chain

Country Status (1)

Country Link
CN (1) CN108881262A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109818932A (en) * 2018-12-28 2019-05-28 华迪计算机集团有限公司 Electronic government documents handle record generation method, apparatus and system
CN109858266A (en) * 2019-01-25 2019-06-07 上海倍通医药科技咨询有限公司 Medicine flow data verification method
CN110336833A (en) * 2019-07-30 2019-10-15 中国工商银行股份有限公司 Image content common recognition method, server based on block chain
CN110417781A (en) * 2019-07-30 2019-11-05 中国工商银行股份有限公司 File encryption management method, client and server based on block chain
CN110430194A (en) * 2019-08-06 2019-11-08 腾讯科技(深圳)有限公司 A kind of method of Information Authentication, the method and device of chess and card Information Authentication
WO2019101224A3 (en) * 2019-02-28 2020-01-02 Alibaba Group Holding Limited System and method for blockchain-based authentication
CN110851843A (en) * 2019-10-08 2020-02-28 立旃(上海)科技有限公司 Data management method and device based on block chain
CN111177798A (en) * 2019-12-31 2020-05-19 上海能塔智能科技有限公司 Data ownership transfer processing method and device, electronic equipment and storage medium
CN111565185A (en) * 2020-04-29 2020-08-21 陈议尊 Information abstract supply and demand transaction method and system based on time division multiplexing
CN111680013A (en) * 2019-03-11 2020-09-18 深圳市深圳通电子商务有限公司 Data sharing method based on block chain, electronic equipment and device
CN111726343A (en) * 2020-06-11 2020-09-29 桂林电子科技大学 Electronic official document safe transmission method based on IPFS and block chain
CN112491878A (en) * 2020-11-26 2021-03-12 杭州安恒信息技术股份有限公司 Method, device and system for detecting MITM attack
CN112738082A (en) * 2020-12-28 2021-04-30 广州辰创科技发展有限公司 Secret information storage verification method and device based on cloud storage and storage medium
CN112804217A (en) * 2020-12-31 2021-05-14 山东数字能源交易中心有限公司 Block chain technology-based evidence storing method and device
WO2021169767A1 (en) * 2020-02-27 2021-09-02 华为技术有限公司 Data processing method and apparatus, device and medium
CN114726560A (en) * 2020-12-22 2022-07-08 富泰华工业(深圳)有限公司 Data protection method, computer device and readable storage medium
CN114760081A (en) * 2020-12-28 2022-07-15 富泰华工业(深圳)有限公司 File encryption and decryption method and device and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410493A (en) * 2014-11-07 2015-03-11 南方电网科学研究院有限责任公司 Secure data storage method and secure data read method based on distributed system infrastructure
CN106407795A (en) * 2016-09-05 2017-02-15 北京众享比特科技有限公司 Data existence authentication system, authentication method and verification method
CN106982205A (en) * 2017-03-01 2017-07-25 中钞***产业发展有限公司北京智能卡技术研究院 Digital asset treating method and apparatus based on block chain
CN107508806A (en) * 2017-08-11 2017-12-22 北京理工大学 Internet financial electronic data safety system and method based on block chain
KR20180029695A (en) * 2016-09-13 2018-03-21 김동만 System and method for transmitting data using block-chain
CN108073639A (en) * 2016-11-16 2018-05-25 北京物资学院 Merchandise news based on block chain preserves system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410493A (en) * 2014-11-07 2015-03-11 南方电网科学研究院有限责任公司 Secure data storage method and secure data read method based on distributed system infrastructure
CN106407795A (en) * 2016-09-05 2017-02-15 北京众享比特科技有限公司 Data existence authentication system, authentication method and verification method
KR20180029695A (en) * 2016-09-13 2018-03-21 김동만 System and method for transmitting data using block-chain
CN108073639A (en) * 2016-11-16 2018-05-25 北京物资学院 Merchandise news based on block chain preserves system
CN106982205A (en) * 2017-03-01 2017-07-25 中钞***产业发展有限公司北京智能卡技术研究院 Digital asset treating method and apparatus based on block chain
CN107508806A (en) * 2017-08-11 2017-12-22 北京理工大学 Internet financial electronic data safety system and method based on block chain

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109818932A (en) * 2018-12-28 2019-05-28 华迪计算机集团有限公司 Electronic government documents handle record generation method, apparatus and system
CN109818932B (en) * 2018-12-28 2021-03-12 华迪计算机集团有限公司 Electronic document handling record generation method, device and system
CN109858266A (en) * 2019-01-25 2019-06-07 上海倍通医药科技咨询有限公司 Medicine flow data verification method
CN109858266B (en) * 2019-01-25 2023-09-05 上海倍通医药科技咨询有限公司 Medicine circulation data verification method
KR20200105997A (en) * 2019-02-28 2020-09-10 알리바바 그룹 홀딩 리미티드 System and method for blockchain-based authentication
KR102237014B1 (en) 2019-02-28 2021-04-07 어드밴스드 뉴 테크놀로지스 씨오., 엘티디. System and method for blockchain-based authentication
WO2019101224A3 (en) * 2019-02-28 2020-01-02 Alibaba Group Holding Limited System and method for blockchain-based authentication
CN111680013A (en) * 2019-03-11 2020-09-18 深圳市深圳通电子商务有限公司 Data sharing method based on block chain, electronic equipment and device
CN110417781B (en) * 2019-07-30 2021-11-19 中国工商银行股份有限公司 Block chain-based document encryption management method, client and server
CN110336833B (en) * 2019-07-30 2022-06-21 中国工商银行股份有限公司 Picture content consensus method based on block chain and server
CN110336833A (en) * 2019-07-30 2019-10-15 中国工商银行股份有限公司 Image content common recognition method, server based on block chain
CN110417781A (en) * 2019-07-30 2019-11-05 中国工商银行股份有限公司 File encryption management method, client and server based on block chain
CN110430194A (en) * 2019-08-06 2019-11-08 腾讯科技(深圳)有限公司 A kind of method of Information Authentication, the method and device of chess and card Information Authentication
CN110430194B (en) * 2019-08-06 2022-04-15 腾讯科技(深圳)有限公司 Information verification method, chess and card information verification method and device
CN110851843A (en) * 2019-10-08 2020-02-28 立旃(上海)科技有限公司 Data management method and device based on block chain
CN111177798A (en) * 2019-12-31 2020-05-19 上海能塔智能科技有限公司 Data ownership transfer processing method and device, electronic equipment and storage medium
WO2021169767A1 (en) * 2020-02-27 2021-09-02 华为技术有限公司 Data processing method and apparatus, device and medium
CN111565185A (en) * 2020-04-29 2020-08-21 陈议尊 Information abstract supply and demand transaction method and system based on time division multiplexing
CN111565185B (en) * 2020-04-29 2023-05-12 陈议尊 Information abstract supply and demand transaction method and system based on time division multiplexing
CN111726343A (en) * 2020-06-11 2020-09-29 桂林电子科技大学 Electronic official document safe transmission method based on IPFS and block chain
CN112491878A (en) * 2020-11-26 2021-03-12 杭州安恒信息技术股份有限公司 Method, device and system for detecting MITM attack
CN114726560A (en) * 2020-12-22 2022-07-08 富泰华工业(深圳)有限公司 Data protection method, computer device and readable storage medium
CN114760081A (en) * 2020-12-28 2022-07-15 富泰华工业(深圳)有限公司 File encryption and decryption method and device and electronic equipment
CN112738082B (en) * 2020-12-28 2023-05-12 广州辰创科技发展有限公司 Secret information storage verification method and device based on cloud storage and storage medium
CN112738082A (en) * 2020-12-28 2021-04-30 广州辰创科技发展有限公司 Secret information storage verification method and device based on cloud storage and storage medium
CN112804217B (en) * 2020-12-31 2022-11-01 山东数字能源交易有限公司 Block chain technology-based evidence storing method and device
CN112804217A (en) * 2020-12-31 2021-05-14 山东数字能源交易中心有限公司 Block chain technology-based evidence storing method and device

Similar Documents

Publication Publication Date Title
CN108881262A (en) Restoring files methods, devices and systems based on block chain
Liang et al. PDPChain: A consortium blockchain-based privacy protection scheme for personal data
US11818262B2 (en) Method and system for one-to-many symmetric cryptography and a network employing the same
CN110061845A (en) Block chain data ciphering method, device, computer equipment and storage medium
WO2022199290A1 (en) Secure multi-party computation
CN109347835A (en) Information transferring method, client, server and computer readable storage medium
CN106301769A (en) Quantum key output intent, storage consistency verification method, Apparatus and system
CN110599163B (en) Transaction record outsourcing method facing block chain transaction supervision
CN109639697A (en) Cloud mobile phone safe throws method, mobile terminal and the server of screen
CN111193703B (en) Communication apparatus and communication method used in distributed network
CN107370595A (en) One kind is based on fine-grained ciphertext access control method
CN109891423A (en) It is controlled using the data encryption of multiple control mechanisms
CN107113314A (en) Method and apparatus for the isomeric data storage management in cloud computing
CN109257347A (en) Communication means and relevant apparatus, storage medium suitable for data interaction between bank
CN108028834A (en) Apparatus and method for Implementation of File Transfer
CN110224984A (en) A kind of multi-party authorization method and device based on block chain technology
CN110601830A (en) Key management method, device, equipment and storage medium based on block chain
WO2022206453A1 (en) Method and apparatus for providing cross-chain private data
US20210144002A1 (en) Secondary Channel Authentication of Public Keys
WO2020082226A1 (en) Method and system for transferring data in a blockchain system
CN114996762A (en) Medical data sharing and privacy protection method and system based on federal learning
CN115622772A (en) Financial data transmission method and application gateway for financial business service
CN106789008A (en) Method, the apparatus and system being decrypted to sharable encryption data
US20220360429A1 (en) Location-key encryption system
CN111224921A (en) Secure transmission method and secure transmission system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181123