CN110598478A - Block chain based evidence verification method, device, equipment and storage medium - Google Patents

Block chain based evidence verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN110598478A
CN110598478A CN201910888548.7A CN201910888548A CN110598478A CN 110598478 A CN110598478 A CN 110598478A CN 201910888548 A CN201910888548 A CN 201910888548A CN 110598478 A CN110598478 A CN 110598478A
Authority
CN
China
Prior art keywords
evidence
hash
block chain
verified
fuzzy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910888548.7A
Other languages
Chinese (zh)
Other versions
CN110598478B (en
Inventor
蔡弋戈
秦青
杨晨
王乐庆
李琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910888548.7A priority Critical patent/CN110598478B/en
Publication of CN110598478A publication Critical patent/CN110598478A/en
Application granted granted Critical
Publication of CN110598478B publication Critical patent/CN110598478B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2471Distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/248Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Computational Linguistics (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to an evidence verification method, an evidence verification device and an evidence verification storage medium based on a block chain, wherein the method comprises the following steps: acquiring evidence information submitted by an evidence provider, wherein the evidence information comprises at least one evidence to be verified; performing hash operation on each evidence to be verified respectively to obtain an evidence hash corresponding to each evidence to be verified respectively; inquiring each evidence hash on the block chain to obtain an inquiry result corresponding to each evidence hash, wherein the inquiry result comprises information whether the evidence hash is stored on the block chain; and determining the authenticity of the evidence to be verified corresponding to each evidence hash according to the query result corresponding to each evidence hash. The scheme that this application provided can provide the reference basis of evidence authenticity for the judicial personnel, reduces the judicial personnel and judges the degree of difficulty of evidence authenticity.

Description

Block chain based evidence verification method, device, equipment and storage medium
Technical Field
The present application relates to the field of information technology, and in particular, to an evidence verification method, apparatus, device, and storage medium based on a block chain.
Background
In judicial cases, it is necessary to judge the authenticity of evidence submitted by case relatives. However, it is not easy for a judicial staff (e.g., a judge) to determine whether the evidence is true, and the tampered evidence may be determined as true evidence by mistake.
Disclosure of Invention
Based on this, it is necessary to provide an evidence verification method, apparatus, device and storage medium based on block chains for technical problems that justice is difficult to judge evidence authenticity.
A method of evidence verification based on blockchains, the method comprising:
acquiring evidence information submitted by an evidence provider, wherein the evidence information comprises at least one evidence to be verified;
performing hash operation on each evidence to be verified respectively to obtain an evidence hash corresponding to each evidence to be verified respectively;
inquiring each evidence hash on a block chain to obtain an inquiry result corresponding to each evidence hash, wherein the inquiry result comprises information whether the evidence hash is stored on the block chain or not;
and determining the authenticity of the evidence to be verified corresponding to each evidence hash according to the query result corresponding to each evidence hash.
An apparatus for evidential verification based on blockchains, the apparatus comprising:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring evidence information submitted by an evidence provider, and the evidence information comprises at least one evidence to be verified;
the computing module is used for respectively carrying out Hash operation on each evidence to be verified to obtain the Hash of the evidence corresponding to each evidence to be verified;
the query module is used for querying each evidence hash on a block chain to obtain a query result corresponding to each evidence hash, wherein the query result comprises information whether the evidence hash is stored on the block chain;
and the verification module is used for determining the authenticity of the evidence to be verified corresponding to each evidence hash according to the query result corresponding to each evidence hash.
A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of:
acquiring evidence information submitted by an evidence provider, wherein the evidence information comprises at least one evidence to be verified;
performing hash operation on each evidence to be verified respectively to obtain an evidence hash corresponding to each evidence to be verified respectively;
inquiring each evidence hash on a block chain to obtain an inquiry result corresponding to each evidence hash, wherein the inquiry result comprises information whether the evidence hash is stored on the block chain or not;
and determining the authenticity of the evidence to be verified corresponding to each evidence hash according to the query result corresponding to each evidence hash.
A computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of:
acquiring evidence information submitted by an evidence provider, wherein the evidence information comprises at least one evidence to be verified;
performing hash operation on each evidence to be verified respectively to obtain an evidence hash corresponding to each evidence to be verified respectively;
inquiring each evidence hash on a block chain to obtain an inquiry result corresponding to each evidence hash, wherein the inquiry result comprises information whether the evidence hash is stored on the block chain or not;
and determining the authenticity of the evidence to be verified corresponding to each evidence hash according to the query result corresponding to each evidence hash.
According to the evidence verification method and device based on the block chain, the computer equipment and the computer readable storage medium, the Hash stored on the block chain is used for verifying the evidence Hash of each evidence to be verified, the Hash value is unique because the Hash value changes when the source file is modified, whether the evidence to be verified is falsified can be verified by inquiring whether the evidence Hash of the evidence to be verified is stored on the block chain, the authenticity of the evidence to be verified is evaluated, a reference basis for evidence authenticity is provided for judicial personnel, and the difficulty of the judicial personnel in judging the authenticity of the evidence is reduced.
Drawings
FIG. 1 is a diagram of an application environment of an evidence verification method based on block chains in one embodiment;
FIG. 2 is a flowchart illustrating an example of a method for evidence verification based on blockchains;
FIG. 3 is a schematic diagram of an interface of a hash generation tool in one embodiment;
FIG. 4 is a block diagram illustrating an interface of a blockchain browser in accordance with an embodiment;
FIG. 5 is a block diagram of an embodiment of an evidence checking apparatus based on blockchains;
FIG. 6 is a block diagram of a computer device in one embodiment;
FIG. 7 is a block diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The block chain underlying platform can comprise processing modules such as user management, basic service, intelligent contract and operation monitoring. The user management module is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, the user management module supervises and audits the transaction condition of certain real identities and provides rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request to storage after consensus on the valid request is completed, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, triggering the contracts and executing the contracts, developers can define contract logics through a certain programming language, issue the contract logics to a block chain (contract registration), call keys or other event triggering and executing according to the logics of contract clauses, complete the contract logics and simultaneously provide the function of upgrading and canceling the contracts; the operation monitoring module is mainly responsible for deployment, configuration modification, contract setting, cloud adaptation in the product release process and visual output of real-time states in product operation, such as: alarm, monitoring network conditions, monitoring node equipment health status, and the like.
The platform product service layer provides basic capability and an implementation framework of typical application, and developers can complete block chain implementation of business logic based on the basic capability and the characteristics of the superposed business. The application service layer provides the application service based on the block chain scheme for the business participants to use.
FIG. 1 is a diagram of an application environment of the evidence checking method based on block chains in an embodiment. As shown in fig. 1, the application environment relates to a terminal 110, a server 120 and a blockchain system 130, the blockchain system 130 includes a plurality of interconnected node servers, the terminal 110 and the server 120 are connected through a network, and the terminal 110 and the server 120 are respectively connected with the blockchain system 130 through a network. The user may access a case online acceptance platform of a judicial institution (e.g., court) through the terminal 110, and the server 120 may be a server on which the case online acceptance platform is located. The terminal 110 or the server 120 obtains the evidence to be verified submitted by the user, and queries whether the evidence hash corresponding to the evidence to be verified is stored in the blockchain system 130, so as to evaluate the authenticity of the evidence to be verified. The terminal 110 may specifically be a desktop terminal or a mobile terminal, and the mobile terminal may specifically be at least one of a mobile phone, a tablet computer, a notebook computer, and the like. The server 120 may be implemented as a stand-alone server or a server cluster composed of a plurality of servers.
In one embodiment, as shown in FIG. 2, a method for evidence verification based on blockchains is provided. The embodiment is mainly illustrated by applying the method to the terminal 110 (or the server 120) in fig. 1. Referring to fig. 2, the block chain-based evidence verification method specifically includes the following steps S202 to S208.
S202, obtaining evidence information submitted by an evidence provider, wherein the evidence information comprises at least one evidence to be verified.
The evidence submitting party can be a case appeasing party, a case appeasing party or a related third party. The evidence to be verified can be the evidence originally in an electronic form (such as video, audio, screenshot of a webpage, an electronic document and the like) or the evidence converted from a real object into an electronic form (such as a borrow photo and the like).
And S204, performing hash operation on the evidences to be verified respectively to obtain the evidence hashes corresponding to the evidences to be verified respectively.
The hash operation has the following characteristics: the hash operation is carried out on the source file, the unique hash value with the fixed length can be obtained, the hash value can be changed greatly when the source file is modified, the hash operation is irreversible, the source file cannot be calculated through the hash value, and the data safety can be ensured.
A hash generation tool may be invoked to perform a hash operation on the proof to be verified. As shown in FIG. 3, in one embodiment, an interface diagram of a hash generation tool is provided, comprising a file upload area, a text input area, and a hash generation area. If the evidence to be verified is a file, the user can upload the evidence to be verified by clicking the file uploading area, or drag the evidence to be verified to the file uploading area. If the evidence to be verified is a text, the user can also input the evidence to be verified in the text input area. The generated hash value is displayed in the hash generation area. Various controls such as copy and hash value generation controls are also arranged in the interface, so as to realize the related functions represented by the controls. And a control which can minimize the interface and close the interface is also arranged at the upper right corner of the interface.
And S206, inquiring the evidence hashes on the block chain to obtain inquiry results corresponding to the evidence hashes respectively, wherein the inquiry results comprise information whether the evidence hashes are stored on the block chain or not.
Each evidence hash can be queried on the blockchain through the blockchain browser to determine whether each evidence hash is stored on the blockchain. As shown in fig. 4, in one embodiment, an interface diagram of a blockchain browser is provided, which includes a query area and a real-time block information display area. The user can input a hash value or other query number in the query area to query the corresponding stored information on the block chain, and the query result is displayed below the query area. The real-time block information display area displays the related information of the blocks on the block chain in real time. The interface is also provided with a control, such as a storage certificate checking control, for realizing the related function represented by the control.
And S208, determining the authenticity of the evidence to be verified corresponding to each evidence hash according to the query result corresponding to each evidence hash.
According to whether the evidence hashes are stored in the block chain or not, whether the evidence to be verified corresponding to the evidence hashes has been verified or not can be determined, if the evidence has been verified, the evidence to be verified can be determined to be real, and if the evidence has not been verified, whether the evidence to be verified is real or not can not be determined, and the evidence to be verified can be considered to be tampered or not clearly verified.
According to the evidence verification method based on the block chain, the Hash stored in the block chain is used for verifying the evidence Hash of each evidence to be verified, the Hash value can be changed when the source file is modified, so that the Hash value is unique, whether the evidence to be verified is tampered can be verified by inquiring whether the evidence Hash of the evidence to be verified is stored in the block chain, the authenticity of the evidence to be verified is evaluated, a reference basis for evidence authenticity is provided for judicial personnel, and the difficulty of the judicial personnel in judging the evidence authenticity is reduced.
Fig. 2 is a flowchart illustrating an evidence checking method based on a blockchain in an embodiment. It should be understood that, although the steps in the flowchart of fig. 2 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in fig. 2 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
In one embodiment, the evidence hashes are respectively used as query indexes to perform query on the block chain, and query results corresponding to the evidence hashes are obtained.
For an evidence hash, the evidence hash can be input through a query box of the blockchain browser to perform query, and whether the evidence hash is stored on the blockchain is determined. In this embodiment, each evidence hash is used as a query index, and a query result of whether each evidence hash is stored on the block chain can be directly obtained.
In one embodiment, the evidence information further comprises: the method comprises the steps that a certificate storage number corresponding to each evidence to be verified corresponds to at least one stored hash on a block chain; taking the certificate storage number as a query index, and querying on the block chain to obtain at least one stored hash corresponding to the certificate storage number on the block chain; and determining whether the stored hash contains the evidence hash, and taking the obtained determination result as the query result corresponding to each evidence hash.
When the original evidence is generated, the hash of the original evidence can be stored to the block chain, and the evidence storage number corresponding to the stored data is obtained. In one embodiment, the original evidence may include multiple related evidences, and when the hashes of the multiple related evidences are stored on the blockchain, the hashes of the multiple related evidences are associated with the same certificate number for storage, so that one certificate number corresponds to multiple stored hashes on the blockchain.
For a certificate storage number, the certificate storage number can be input through a query box of a blockchain browser for query, at least one stored hash corresponding to the certificate storage number on a blockchain is obtained, each evidence hash is compared with the stored hash obtained through query, and whether each evidence hash is included in the stored hashes is determined.
In the embodiment, the certificate storage number is used as the query index, when a plurality of relevant evidences exist, the stored hashes corresponding to the relevant evidences can be obtained through one-time query, the query times are reduced, and the query efficiency is improved.
In one embodiment, if the query result is that the evidence hash is stored on the block chain, it is determined that the authenticity of the evidence to be verified corresponding to the evidence hash is of a first level.
The authenticity of the evidence to be verified is the first level, which indicates that the evidence to be verified is real and has not been tampered. The authenticity of the evidence to be verified is evaluated by adopting the grade, so that a more intuitive reference basis for judging the authenticity of the evidence is provided for judicial personnel.
In one embodiment, if the query result is that no evidence hash is stored on the block chain, determining an evidence fuzzy hash of the evidence to be verified corresponding to the evidence hash; and determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to the evidence fuzzy hash.
The fuzzy hash can be obtained by fuzzy hash operation, and the fuzzy hash operation has the following characteristics: and performing fuzzy hash operation on the two source files to obtain two fuzzy hash values, wherein the similarity of the two fuzzy hash values can be used for judging the similarity of the two source files. The latest evidence submitted by an evidence submitting party is not identical to the original evidence uploaded to the block chain for evidence storage, but is very similar to the original evidence, and the similarity between the latest evidence and the original evidence can be judged through fuzzy hashing, so that a reference basis for judging the authenticity of the evidence is further provided for judicial staff.
In one embodiment, the method for determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to the evidence fuzzy hash comprises the following steps: whether fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain is inquired, and the similarity between the evidence fuzzy hash and the fuzzy hash is greater than or equal to a preset similarity threshold; and determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to whether the fuzzy hash query result corresponding to the evidence fuzzy hash is stored in the block chain.
Fuzzy query can be carried out on the evidence fuzzy hash on the blockchain through the blockchain browser, and whether the fuzzy hash with the similarity larger than or equal to a preset similarity threshold value is stored on the blockchain or not is determined. The predetermined similarity threshold may be set according to actual needs, and is not limited herein.
In one embodiment, the evidence fuzzy hash is used as a query index, and whether a fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain is queried.
For an evidence fuzzy hash, inputting the evidence fuzzy hash through a query box of a block chain browser to perform fuzzy query, and determining whether the fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain, wherein the fuzzy hash corresponding to the evidence fuzzy hash is a fuzzy hash whose similarity with the evidence fuzzy hash is greater than or equal to a predetermined similarity threshold. In this embodiment, each evidence fuzzy hash is used as a query index, and a query result of whether a fuzzy hash corresponding to the evidence fuzzy hash is stored on the block chain can be directly obtained.
In one embodiment, the evidence information further comprises: the method comprises the steps that a certificate storage number corresponding to each evidence to be verified is stored, and at least one stored fuzzy hash is stored on a block chain corresponding to the certificate storage number; taking the deposit certificate number as a query index, and querying on the block chain to obtain at least one stored fuzzy hash corresponding to the deposit certificate number on the block chain; and determining whether the stored fuzzy hash contains fuzzy hash corresponding to the evidence fuzzy hash, and taking the obtained determination result as a query result of whether the fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain.
When the original evidence is generated, the hash and the fuzzy hash of the original evidence can be stored on the block chain together, and the evidence storage number corresponding to the stored data is obtained. In one embodiment, the original evidence may include a plurality of related evidences, and when the hashes and the fuzzy hashes of the plurality of related evidences are stored on the blockchain, the hashes and the fuzzy hashes are associated with the same certificate number for storage, so that one certificate number corresponds to a plurality of stored hashes and a plurality of stored fuzzy hashes on the blockchain.
For a evidence storage number, the evidence storage number can be input through a query box of a blockchain browser for query, at least one stored fuzzy hash corresponding to the evidence storage number on a blockchain is obtained, the evidence fuzzy hash is compared with the stored fuzzy hash obtained through query, whether the stored fuzzy hash contains the evidence hash corresponding to the evidence fuzzy hash is determined, and the fuzzy hash corresponding to the evidence fuzzy hash is the fuzzy hash with the similarity of the evidence fuzzy hash larger than or equal to a preset similarity threshold.
In the embodiment, the certificate storage number is used as the query index, when a plurality of relevant evidences exist, the stored fuzzy hash corresponding to the relevant evidences can be obtained through one-time query, the query times are reduced, and the query efficiency is improved.
In one embodiment, if fuzzy hashes corresponding to the fuzzy hashes of the evidence are stored in the block chain, the authenticity of the evidence to be verified is determined to be a second level; and if the fuzzy hash corresponding to the evidence fuzzy hash is not stored in the block chain, determining the authenticity of the evidence to be verified to be a third grade.
If the fuzzy hash corresponding to the evidence fuzzy hash of the evidence to be verified is stored in the block chain, it can be considered that the evidence similar to the evidence to be verified is stored in the block chain, and the authenticity of the evidence to be verified is determined as a second level. If the fuzzy hash corresponding to the evidence fuzzy hash of the evidence to be verified is not stored in the block chain, it can be considered that the possibility that the evidence to be verified has been tampered is relatively high, and the authenticity of the evidence to be verified is determined to be a third level.
In one embodiment, the authenticity of the first level, the second level, and the third level decreases in sequence. The lower the authenticity of the proof to be verified, the higher the likelihood that the proof to be verified is tampered with. The authenticity grade corresponding to the evidence to be verified is used as a reference, so that the difficulty of judicial personnel in judging the authenticity of the evidence is reduced.
As shown in fig. 5, in one embodiment, there is provided an evidence verification apparatus 500 based on a blockchain, including: an acquisition module 510, a calculation module 520, a query module 530, and a check module 540.
The obtaining module 510 is configured to obtain evidence information submitted by an evidence provider, where the evidence information includes at least one to-be-verified evidence.
The calculating module 520 is configured to perform hash operation on each to-be-verified evidence respectively to obtain an evidence hash corresponding to each to-be-verified evidence.
The query module 530 is configured to query each evidence hash on the block chain to obtain a query result corresponding to each evidence hash, where the query result includes information about whether the evidence hash is stored on the block chain.
The verifying module 540 is configured to determine, according to the query result corresponding to each evidence hash, authenticity of the evidence to be verified corresponding to each evidence hash.
Above-mentioned evidence verifying attachment based on block chain utilizes the Hash of storage on the block chain to check each evidence Hash of evidence that waits to verify, because the source file has when any modification, Hash value all can change, therefore Hash value is unique, whether through inquiring whether the evidence Hash of the evidence that waits to verify of storage on the block chain, can verify whether the evidence of waiting to verify is tampered, thereby treat the authenticity of the evidence of verifying and evaluate, provide the reference basis of evidence authenticity for judicial personnel, reduce the degree of difficulty that judicial personnel judge the evidence authenticity.
In an embodiment, the query module 530 is specifically configured to query the evidence hashes on the block chain to obtain query results corresponding to the evidence hashes, and use the evidence hashes as query indexes to query the block chain to obtain query results corresponding to the evidence hashes.
In one embodiment, the evidence information further comprises: the method comprises the steps that a certificate storage number corresponding to each evidence to be verified corresponds to at least one stored hash on a block chain; the query module 530 is configured to query each evidence hash on the blockchain, and when obtaining query results corresponding to each evidence hash, specifically, to query the blockchain by using the evidence storage number as a query index to obtain at least one stored hash corresponding to the evidence storage number on the blockchain; and determining whether the stored hash contains the evidence hash, and taking the obtained determination result as the query result corresponding to each evidence hash.
In an embodiment, the verification module 540 is specifically configured to, when determining the authenticity of the to-be-verified evidence respectively corresponding to each evidence hash according to the query result respectively corresponding to each evidence hash, determine that the authenticity of the to-be-verified evidence corresponding to the evidence hash is a first level if the query result is that the evidence hash is stored on the block chain.
In an embodiment, the verification module 540 is specifically configured to determine an evidence fuzzy hash of the evidence to be verified corresponding to each evidence hash if the query result is that the evidence hash is not stored on the block chain when determining the authenticity of the evidence to be verified corresponding to each evidence hash according to the query result corresponding to each evidence hash; and determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to the evidence fuzzy hash.
In an embodiment, the verification module 540 is specifically configured to query whether a fuzzy hash corresponding to the evidence fuzzy hash is stored on the block chain when determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to the evidence fuzzy hash, where a similarity between the evidence fuzzy hash and the fuzzy hash is greater than or equal to a predetermined similarity threshold; and determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to whether the fuzzy hash query result corresponding to the evidence fuzzy hash is stored in the block chain.
In an embodiment, the checking module 540 is specifically configured to use the evidence fuzzy hash as a query index when querying whether the fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain, and query whether the fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain.
In one embodiment, the evidence information further comprises: the method comprises the steps that a certificate storage number corresponding to each evidence to be verified is stored, and at least one stored fuzzy hash is stored on a block chain corresponding to the certificate storage number; the checking module 540 is specifically configured to query the block chain by using the evidence storage number as a query index when querying whether the fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain, and obtain at least one stored fuzzy hash corresponding to the evidence storage number in the block chain; and determining whether the stored fuzzy hash contains fuzzy hash corresponding to the evidence fuzzy hash, and taking the obtained determination result as a query result of whether the fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain.
In an embodiment, the verification module 540 is specifically configured to determine, when determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to whether the fuzzy hash query result corresponding to the evidence fuzzy hash is stored in the block chain, that the authenticity of the evidence to be verified is the second level if the fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain; and if the fuzzy hash corresponding to the evidence fuzzy hash is not stored in the block chain, determining the authenticity of the evidence to be verified to be a third grade.
In one embodiment, the authenticity of the first level, the second level, and the third level decreases in sequence.
For specific definition of the evidence checking apparatus based on the block chain, reference may be made to the above definition of the evidence checking method based on the block chain, and details are not described here. The modules in the above block chain-based evidence checking apparatus may be implemented in whole or in part by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
FIG. 6 is a diagram illustrating an internal structure of a computer device in one embodiment. The computer device may specifically be the terminal 110 in fig. 1. As shown in fig. 6, the computer apparatus includes a processor, a memory, a network interface, an input device, and a display screen connected through a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement a blockchain-based evidence verification method. The internal memory may also have stored therein a computer program that, when executed by the processor, causes the processor to perform a blockchain based evidence verification method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
FIG. 7 is a diagram illustrating an internal structure of a computer device in one embodiment. The computer device may specifically be the server 120 in fig. 1. As shown in fig. 7, the computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement a blockchain-based evidence verification method. The internal memory may also have stored therein a computer program that, when executed by the processor, causes the processor to perform a blockchain based evidence verification method.
Those skilled in the art will appreciate that the configurations shown in fig. 6 or 7 are merely block diagrams of some configurations relevant to the present disclosure, and do not constitute a limitation on the computing devices to which the present disclosure may be applied, and that a particular computing device may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, the block chain based evidence verification apparatus provided in the present application may be implemented in the form of a computer program, which may be run on a computer device as shown in fig. 6 or fig. 7. The memory of the computer device may store various program modules constituting the block chain-based evidence verification apparatus, such as the acquisition module, the calculation module, the query module, and the verification module shown in fig. 5. The computer program of each program module causes the processor to execute the steps of the block chain based evidence verification method of each embodiment of the present application described in the present specification.
For example, the computer device shown in fig. 6 or fig. 7 may execute step S202 through the obtaining module in the evidence checking apparatus based on the block chain as shown in fig. 5. The computer device may perform step S204 through the calculation module. The computer device may perform step S206 through the query module. The computer device may perform step S208 through the verification module.
In one embodiment, there is provided a computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of: acquiring evidence information submitted by an evidence provider, wherein the evidence information comprises at least one evidence to be verified; performing hash operation on each evidence to be verified respectively to obtain an evidence hash corresponding to each evidence to be verified respectively; inquiring each evidence hash on the block chain to obtain an inquiry result corresponding to each evidence hash, wherein the inquiry result comprises information whether the evidence hash is stored on the block chain; and determining the authenticity of the evidence to be verified corresponding to each evidence hash according to the query result corresponding to each evidence hash.
In one embodiment, the computer program causes the processor to specifically execute the following steps when executing query on the block chain for each evidence hash and obtaining a query result corresponding to each evidence hash: and respectively taking the evidence hashes as query indexes, and querying on the block chain to obtain query results respectively corresponding to the evidence hashes.
In one embodiment, the evidence information further comprises: the method comprises the steps that a certificate storage number corresponding to each evidence to be verified corresponds to at least one stored hash on a block chain; the computer program enables the processor to execute the following steps when querying each evidence hash on the block chain and obtaining the query result corresponding to each evidence hash: taking the certificate storage number as a query index, and querying on the block chain to obtain at least one stored hash corresponding to the certificate storage number on the block chain; and determining whether the stored hash contains the evidence hash, and taking the obtained determination result as the query result corresponding to each evidence hash.
In one embodiment, the computer program enables the processor to specifically execute the following steps when determining the authenticity of the evidence to be verified corresponding to each evidence hash according to the query result corresponding to each evidence hash: and if the query result is that the evidence hash is stored in the block chain, determining that the authenticity of the evidence to be verified corresponding to the evidence hash is a first level.
In one embodiment, the computer program enables the processor to specifically execute the following steps when determining the authenticity of the evidence to be verified corresponding to each evidence hash according to the query result corresponding to each evidence hash: if the query result is that the evidence hash is not stored on the block chain, determining the evidence fuzzy hash of the evidence to be verified corresponding to the evidence hash; and determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to the evidence fuzzy hash.
In one embodiment, the computer program enables the processor to specifically execute the following steps when determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to the evidence fuzzy hash: whether fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain is inquired, and the similarity between the evidence fuzzy hash and the fuzzy hash is greater than or equal to a preset similarity threshold; and determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to whether the fuzzy hash query result corresponding to the evidence fuzzy hash is stored in the block chain.
In one embodiment, the computer program enables the processor to specifically execute the following steps when executing whether a fuzzy hash corresponding to an evidence fuzzy hash is stored in the query block chain: and taking the evidence fuzzy hash as a query index, and querying whether fuzzy hashes corresponding to the evidence fuzzy hashes are stored in the block chain.
In one embodiment, the evidence information further comprises: the method comprises the steps that a certificate storage number corresponding to each evidence to be verified is stored, and at least one stored fuzzy hash is stored on a block chain corresponding to the certificate storage number; the computer program enables the processor to specifically execute the following steps when the processor executes whether the fuzzy hash corresponding to the evidence fuzzy hash is stored in the query block chain or not: taking the deposit certificate number as a query index, and querying on the block chain to obtain at least one stored fuzzy hash corresponding to the deposit certificate number on the block chain; and determining whether the stored fuzzy hash contains fuzzy hash corresponding to the evidence fuzzy hash, and taking the obtained determination result as a query result of whether the fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain.
In one embodiment, the computer program enables the processor to specifically execute the following steps when determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to whether the block chain stores the query result of the fuzzy hash corresponding to the evidence fuzzy hash or not: if the fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain, determining the authenticity of the evidence to be verified to be a second grade; and if the fuzzy hash corresponding to the evidence fuzzy hash is not stored in the block chain, determining the authenticity of the evidence to be verified to be a third grade.
In one embodiment, the authenticity of the first level, the second level, and the third level decreases in sequence.
In one embodiment, a computer readable storage medium is provided, storing a computer program that, when executed by a processor, causes the processor to perform the steps of: acquiring evidence information submitted by an evidence provider, wherein the evidence information comprises at least one evidence to be verified; performing hash operation on each evidence to be verified respectively to obtain an evidence hash corresponding to each evidence to be verified respectively; inquiring each evidence hash on the block chain to obtain an inquiry result corresponding to each evidence hash, wherein the inquiry result comprises information whether the evidence hash is stored on the block chain; and determining the authenticity of the evidence to be verified corresponding to each evidence hash according to the query result corresponding to each evidence hash.
In one embodiment, the computer program causes the processor to specifically execute the following steps when executing query on the block chain for each evidence hash and obtaining a query result corresponding to each evidence hash: and respectively taking the evidence hashes as query indexes, and querying on the block chain to obtain query results respectively corresponding to the evidence hashes.
In one embodiment, the evidence information further comprises: the method comprises the steps that a certificate storage number corresponding to each evidence to be verified corresponds to at least one stored hash on a block chain; the computer program enables the processor to execute the following steps when querying each evidence hash on the block chain and obtaining the query result corresponding to each evidence hash: taking the certificate storage number as a query index, and querying on the block chain to obtain at least one stored hash corresponding to the certificate storage number on the block chain; and determining whether the stored hash contains the evidence hash, and taking the obtained determination result as the query result corresponding to each evidence hash.
In one embodiment, the computer program enables the processor to specifically execute the following steps when determining the authenticity of the evidence to be verified corresponding to each evidence hash according to the query result corresponding to each evidence hash: and if the query result is that the evidence hash is stored in the block chain, determining that the authenticity of the evidence to be verified corresponding to the evidence hash is a first level.
In one embodiment, the computer program enables the processor to specifically execute the following steps when determining the authenticity of the evidence to be verified corresponding to each evidence hash according to the query result corresponding to each evidence hash: if the query result is that the evidence hash is not stored on the block chain, determining the evidence fuzzy hash of the evidence to be verified corresponding to the evidence hash; and determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to the evidence fuzzy hash.
In one embodiment, the computer program enables the processor to specifically execute the following steps when determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to the evidence fuzzy hash: whether fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain is inquired, and the similarity between the evidence fuzzy hash and the fuzzy hash is greater than or equal to a preset similarity threshold; and determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to whether the fuzzy hash query result corresponding to the evidence fuzzy hash is stored in the block chain.
In one embodiment, the computer program enables the processor to specifically execute the following steps when executing whether a fuzzy hash corresponding to an evidence fuzzy hash is stored in the query block chain: and taking the evidence fuzzy hash as a query index, and querying whether fuzzy hashes corresponding to the evidence fuzzy hashes are stored in the block chain.
In one embodiment, the evidence information further comprises: the method comprises the steps that a certificate storage number corresponding to each evidence to be verified is stored, and at least one stored fuzzy hash is stored on a block chain corresponding to the certificate storage number; the computer program enables the processor to specifically execute the following steps when the processor executes whether the fuzzy hash corresponding to the evidence fuzzy hash is stored in the query block chain or not: taking the deposit certificate number as a query index, and querying on the block chain to obtain at least one stored fuzzy hash corresponding to the deposit certificate number on the block chain; and determining whether the stored fuzzy hash contains fuzzy hash corresponding to the evidence fuzzy hash, and taking the obtained determination result as a query result of whether the fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain.
In one embodiment, the computer program enables the processor to specifically execute the following steps when determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to whether the block chain stores the query result of the fuzzy hash corresponding to the evidence fuzzy hash or not: if the fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain, determining the authenticity of the evidence to be verified to be a second grade; and if the fuzzy hash corresponding to the evidence fuzzy hash is not stored in the block chain, determining the authenticity of the evidence to be verified to be a third grade.
In one embodiment, the authenticity of the first level, the second level, and the third level decreases in sequence.
It should be understood that the terms "first", "second", "third", etc. in the above embodiments are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implying any number of technical features indicated.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. An evidence verification method based on a block chain comprises the following steps:
acquiring evidence information submitted by an evidence provider, wherein the evidence information comprises at least one evidence to be verified;
performing hash operation on each evidence to be verified respectively to obtain an evidence hash corresponding to each evidence to be verified respectively;
inquiring each evidence hash on a block chain to obtain an inquiry result corresponding to each evidence hash, wherein the inquiry result comprises information whether the evidence hash is stored on the block chain or not;
and determining the authenticity of the evidence to be verified corresponding to each evidence hash according to the query result corresponding to each evidence hash.
2. The method of claim 1, comprising at least one of:
the first item:
querying each evidence hash on the block chain to obtain query results corresponding to each evidence hash, including:
respectively taking each evidence hash as a query index, and querying on a block chain to obtain query results respectively corresponding to each evidence hash;
the second term is:
the evidence information further includes: the evidence storing number corresponds to each evidence to be verified, and the evidence storing number corresponds to at least one stored hash on the block chain;
querying each evidence hash on the block chain to obtain query results corresponding to each evidence hash, including:
taking the certificate storing number as a query index, and querying on the block chain to obtain at least one stored hash corresponding to the certificate storing number on the block chain;
and determining whether the stored hash contains the evidence hash, and taking the obtained determination result as a query result corresponding to each evidence hash.
3. The method according to claim 1, wherein determining authenticity of the evidence to be verified corresponding to each of the evidence hashes according to the query result corresponding to each of the evidence hashes includes any one of:
the first item:
if the query result indicates that the evidence hash is stored in the block chain, determining that the authenticity of the evidence to be verified corresponding to the evidence hash is a first level;
the second term is:
if the query result indicates that the evidence hash is not stored in the block chain, determining an evidence fuzzy hash of the evidence to be verified corresponding to the evidence hash;
and determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to the evidence fuzzy hash.
4. The method according to claim 3, wherein determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to the evidence fuzzy hash comprises:
inquiring whether fuzzy hash corresponding to the evidence fuzzy hash is stored in a block chain or not, wherein the similarity between the evidence fuzzy hash and the fuzzy hash is greater than or equal to a preset similarity threshold;
and determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to whether the fuzzy hash query result corresponding to the evidence fuzzy hash is stored in the block chain.
5. The method of claim 4, comprising at least one of:
the first item:
inquiring whether fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain or not, wherein the inquiring comprises the following steps:
taking the evidence fuzzy hash as a query index, and querying whether a fuzzy hash corresponding to the evidence fuzzy hash is stored in a block chain;
the second term is:
the evidence information further includes: the evidence storing number corresponds to each evidence to be verified, and the evidence storing number corresponds to at least one stored fuzzy hash on the block chain;
inquiring whether fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain or not, wherein the inquiring comprises the following steps:
taking the certificate storing number as a query index, and querying on the block chain to obtain at least one stored fuzzy hash corresponding to the certificate storing number on the block chain;
and determining whether the stored fuzzy hash contains fuzzy hash corresponding to the evidence fuzzy hash, and taking the obtained determination result as a query result of whether the fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain.
6. The method according to claim 5, wherein determining the authenticity of the evidence to be verified corresponding to the evidence fuzzy hash according to whether the fuzzy hash query result of the evidence fuzzy hash is stored on the block chain comprises:
if the fuzzy hash corresponding to the evidence fuzzy hash is stored in the block chain, determining that the authenticity of the evidence to be verified is a second grade;
and if the fuzzy hash corresponding to the evidence fuzzy hash is not stored in the block chain, determining that the authenticity of the evidence to be verified is a third grade.
7. The method of claim 6, wherein the first level, the second level, and the third level correspond to successively lower authenticity.
8. An apparatus for evidentiary verification based on blockchains, the apparatus comprising:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring evidence information submitted by an evidence provider, and the evidence information comprises at least one evidence to be verified;
the computing module is used for respectively carrying out Hash operation on each evidence to be verified to obtain the Hash of the evidence corresponding to each evidence to be verified;
the query module is used for querying each evidence hash on a block chain to obtain a query result corresponding to each evidence hash, wherein the query result comprises information whether the evidence hash is stored on the block chain;
and the verification module is used for determining the authenticity of the evidence to be verified corresponding to each evidence hash according to the query result corresponding to each evidence hash.
9. A computer-readable storage medium, storing a computer program which, when executed by a processor, causes the processor to carry out the steps of the method according to any one of claims 1 to 7.
10. A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of the method according to any one of claims 1 to 7.
CN201910888548.7A 2019-09-19 2019-09-19 Block chain-based evidence verification method, device, equipment and storage medium Active CN110598478B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910888548.7A CN110598478B (en) 2019-09-19 2019-09-19 Block chain-based evidence verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910888548.7A CN110598478B (en) 2019-09-19 2019-09-19 Block chain-based evidence verification method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110598478A true CN110598478A (en) 2019-12-20
CN110598478B CN110598478B (en) 2024-06-07

Family

ID=68861501

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910888548.7A Active CN110598478B (en) 2019-09-19 2019-09-19 Block chain-based evidence verification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110598478B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111291415A (en) * 2020-03-12 2020-06-16 北京阿尔山金融科技有限公司 Data storage method and device and business system server
CN111400403A (en) * 2020-03-14 2020-07-10 北京工业大学 Distributed verification method for authenticity of Internet of things data based on block chain technology
CN111510298A (en) * 2020-04-10 2020-08-07 中国司法大数据研究院有限公司 Cross-domain trusted data exchange method and system based on block chain
CN112069469A (en) * 2020-11-11 2020-12-11 支付宝(杭州)信息技术有限公司 Method and device for processing work data based on block chain
CN112380269A (en) * 2020-10-28 2021-02-19 杭州链城数字科技有限公司 Identity card information inquiry and evidence fixing and obtaining method based on block chain
CN112950416A (en) * 2021-03-11 2021-06-11 全链通有限公司 Block chain-based electronic evidence processing method and device and readable medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106599242A (en) * 2016-12-20 2017-04-26 福建六壬网安股份有限公司 Webpage change monitoring method and system based on similarity calculation
CN108764944A (en) * 2018-05-31 2018-11-06 北京京东尚科信息技术有限公司 Verification method, device and computer readable storage medium
CN109345061A (en) * 2018-08-21 2019-02-15 阿里巴巴集团控股有限公司 A kind of method and device of identification evidence authenticity that depositing card based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106599242A (en) * 2016-12-20 2017-04-26 福建六壬网安股份有限公司 Webpage change monitoring method and system based on similarity calculation
CN108764944A (en) * 2018-05-31 2018-11-06 北京京东尚科信息技术有限公司 Verification method, device and computer readable storage medium
CN109345061A (en) * 2018-08-21 2019-02-15 阿里巴巴集团控股有限公司 A kind of method and device of identification evidence authenticity that depositing card based on block chain

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111291415A (en) * 2020-03-12 2020-06-16 北京阿尔山金融科技有限公司 Data storage method and device and business system server
CN111400403A (en) * 2020-03-14 2020-07-10 北京工业大学 Distributed verification method for authenticity of Internet of things data based on block chain technology
CN111400403B (en) * 2020-03-14 2021-04-23 北京工业大学 Distributed verification method for authenticity of Internet of things data based on block chain technology
CN111510298A (en) * 2020-04-10 2020-08-07 中国司法大数据研究院有限公司 Cross-domain trusted data exchange method and system based on block chain
CN111510298B (en) * 2020-04-10 2022-03-25 中国司法大数据研究院有限公司 Cross-domain trusted data exchange method and system based on block chain
CN112380269A (en) * 2020-10-28 2021-02-19 杭州链城数字科技有限公司 Identity card information inquiry and evidence fixing and obtaining method based on block chain
CN112069469A (en) * 2020-11-11 2020-12-11 支付宝(杭州)信息技术有限公司 Method and device for processing work data based on block chain
CN112069469B (en) * 2020-11-11 2021-04-23 支付宝(杭州)信息技术有限公司 Method and device for processing work data based on block chain
CN112950416A (en) * 2021-03-11 2021-06-11 全链通有限公司 Block chain-based electronic evidence processing method and device and readable medium
CN112950416B (en) * 2021-03-11 2023-11-17 全链通有限公司 Electronic evidence processing method and device based on blockchain and readable medium

Also Published As

Publication number Publication date
CN110598478B (en) 2024-06-07

Similar Documents

Publication Publication Date Title
CN110598478B (en) Block chain-based evidence verification method, device, equipment and storage medium
CN109791591B (en) Method and system for identity and credential protection and verification via blockchain
US11360963B2 (en) Tracking and verification of physical assets
US20190156429A1 (en) Hierarchical meta-ledger transaction recording
CN110597837B (en) Service data processing method, device, storage medium and computer equipment
CN110535971B (en) Interface configuration processing method, device, equipment and storage medium based on block chain
CN110602116B (en) Block chain based data verification method, device and computer readable storage medium
CN110599137A (en) Electronic bill data processing method and device and computer equipment
US11860856B2 (en) Managing distributed ledger storage space
CN110597818B (en) File inquiry method, device, equipment and storage medium based on block chain
CN110599357A (en) Insurance business data processing method and device based on block chain and storage medium
Burri et al. Chronological independently verifiable electronic chain of custody ledger using blockchain technology
US11621844B2 (en) Secure data transfer system and method
CN113326081A (en) Static resource processing method and device, computer equipment and storage medium
WO2021074742A1 (en) Chaincode recommendation based on existing chaincode
CN110598475B (en) Work attribute information acquisition method and device based on block chain and computer equipment
CN111709860A (en) Homote advice processing method, device, equipment and storage medium
CN109658126A (en) Data processing method, device, equipment and storage medium based on product promotion
CN111597424A (en) Crawler identification method and device, computer equipment and storage medium
CN113726784A (en) Network data security monitoring method, device, equipment and storage medium
CN110909082A (en) Method and device for generating block chain certificate of works
CN115270193A (en) Data file secure sharing method and device based on block chain and under cooperative synchronization
CN111817859A (en) Data sharing method, device, equipment and storage medium based on zero knowledge proof
CN110599332A (en) Block chain-based user intention determination method, device, equipment and storage medium
CN111274597A (en) Data processing method and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant