CN110601848A - Appointment information processing method, device and system based on block chain and electronic equipment - Google Patents

Appointment information processing method, device and system based on block chain and electronic equipment Download PDF

Info

Publication number
CN110601848A
CN110601848A CN201910850833.XA CN201910850833A CN110601848A CN 110601848 A CN110601848 A CN 110601848A CN 201910850833 A CN201910850833 A CN 201910850833A CN 110601848 A CN110601848 A CN 110601848A
Authority
CN
China
Prior art keywords
information
msg
appointment
hash value
appointment information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910850833.XA
Other languages
Chinese (zh)
Other versions
CN110601848B (en
Inventor
尚书
王淋
杨光
伍鸣
龙凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Shutu Blockchain Research Institute
Original Assignee
Beijing Qinghong Weigu Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qinghong Weigu Technology Development Co Ltd filed Critical Beijing Qinghong Weigu Technology Development Co Ltd
Priority to CN201910850833.XA priority Critical patent/CN110601848B/en
Publication of CN110601848A publication Critical patent/CN110601848A/en
Application granted granted Critical
Publication of CN110601848B publication Critical patent/CN110601848B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application provides a method, a device and a system for processing appointed information based on a block chain and electronic equipment. The method comprises the following steps: acquiring appointment information (msg) to be stored, wherein the appointment information is generated from application software; generating a random key (Ai); encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information; calculating a hash value of the commitment information (msg); signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data; uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain.

Description

Appointment information processing method, device and system based on block chain and electronic equipment
Technical Field
The embodiment of the application relates to the technical field of block chains, in particular to a block chain-based appointed information processing method, device and system and electronic equipment.
Background
People often establish various conventions with others in social contact, and the conventions have evidence-saving significance whether formally proposed or orally proposed. As the name suggests, evidence may, but need not, be legally effective as a default witness.
At present, there are two main methods for storing certificates, one is non-electronic certificate based on traditional media (such as paper), and the other is electronic certificate based on centralized computer storage media. The former is inconvenient to store for a long time and has a risk of loss, and the latter cannot guarantee that the recorded appointed content cannot be maliciously tampered/deleted. In view of this, how to provide a lively anti-loss and anti-tamper promissory evidence-storing service is a technical problem to be solved at present.
The block chain technology is a novel application technology set of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. From the data perspective, the block chain combines the data blocks in a sequential connection mode into a chain data structure according to the time sequence, and the data structure is guaranteed to be not falsifiable and not to be forged in a cryptographic mode. From a technical perspective, blockchain technology integrates a plurality of different technologies, and by constructing a blockchain network, each node in the network allows obtaining a complete copy of a data block, and maintains update of the blockchain-based data block based on a consensus mechanism and competition calculation. Therefore, the decentralized and distrust of data storage and management are realized through an end-to-end network formed by multi-node communication.
In the prior art, original data content is stored in a block chain, and an administrator of an internet service provider masters absolute control authority of a system, so that the internet service provider can completely acquire the original data content of a user and modify the original data content, and the security of the original data content of the user is low.
Disclosure of Invention
The embodiment of the application aims to provide a block chain-based contract information processing method, a block chain-based contract information processing device and electronic equipment, and the method, the device and the electronic equipment can provide a life-activated contract evidence storage service for preventing loss and tampering.
In order to achieve the above purpose, the embodiments of the present application are implemented as follows:
in a first aspect, a method for processing contracted information based on a block chain is provided, including:
acquiring appointment information (msg) to be stored, wherein the appointment information is generated from application software;
generating a random key (Ai);
encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
calculating a hash value of the commitment information (msg);
signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data;
uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain.
In a second aspect, an apparatus for handling provisioning information based on a block chain is provided, including:
the system comprises an information acquisition module, a storage module and a processing module, wherein the information acquisition module is used for acquiring appointment information (msg) to be stored, and the appointment information is generated from application software;
a key generation module for generating a random key (Ai);
the encryption module is used for encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
a hash calculation module for calculating a hash value of the appointment information (msg);
the digital signature module is used for signing the hash value of the agreed information (msg) by using a private key (privatekey) of a user to obtain signature data;
an upload module for uploading the hash values of the encryption contract information and the contract information (msg) into a block chain.
In a third aspect, there is provided an appointment information processing system, comprising: user equipment, a service platform and a block chain;
the service platform is used for providing application service for the user equipment and sending appointment information (msg);
the user equipment is used for acquiring the appointment information (msg) to be stored; generating a random key (Ai); encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information; calculating a hash value of the commitment information (msg); signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data; uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain;
the block chain is used for storing the encryption contract information and the hash value of the contract information (msg).
In a fourth aspect, an electronic device is provided comprising: a memory, a processor, and a computer program stored on the memory and executable on the processor, the computer program executed by the processor to:
acquiring appointment information (msg) to be stored, wherein the appointment information is generated from application software;
generating a random key (Ai);
encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
calculating a hash value of the commitment information (msg);
signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data;
uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain.
In a fifth aspect, a computer-readable storage medium is provided, having stored thereon a computer program which, when executed by a processor, performs the steps of:
acquiring appointment information (msg) to be stored, wherein the appointment information is generated from application software;
generating a random key (Ai);
encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
calculating a hash value of the commitment information (msg);
signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data;
uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain.
According to the scheme of the embodiment of the application, when the appointment information is generated and the data is encrypted, the randomly generated encryption key is used every time, so that the data security is provided, and an internet service provider can not obtain the original data content of the user. Meanwhile, the decentralized block chain is provided with a plurality of block chain nodes, more than half of the block chain nodes are damaged to tamper the promissory certificate or the irreversible verification information, and all the block chain nodes are damaged to delete the substrate of the promissory certificate or the irreversible verification information, which can not be realized theoretically, so that the effective and reliable certificate storage function can be realized, and the long-term storage by a user is facilitated.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative efforts.
Fig. 1 is a schematic flow chart of a contract information processing method according to an embodiment of the present application.
Fig. 2 is a schematic flow chart of a second method for processing provisioning information according to an embodiment of the present application.
Fig. 3 is a schematic diagram of a structure of an upload block chain data frame according to an embodiment of the present application.
Fig. 4 is a schematic structural diagram of an appointment information processing apparatus according to an embodiment of the present application.
Fig. 5 is a schematic structural diagram of an appointment information processing system according to an embodiment of the present application.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be described clearly and completely below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
As mentioned above, there are two main methods for providing evidence for contract, one is non-electronic evidence based on traditional media, and the other is electronic evidence based on centralized computer storage media. The former is inconvenient for long-term storage and has a risk of loss, and the latter cannot guarantee that the recorded appointed content cannot be maliciously tampered/deleted.
Meanwhile, in the existing block chain technology, original data content is stored in a block chain, and an administrator of an internet service provider grasps absolute control authority of a system, so that the internet service provider can completely acquire the original data content of a user and modify the original data content, and the security of the original data content of the user is low.
Therefore, the application aims to provide a living anti-loss and anti-tampering promissory evidence storage scheme.
Hash is a Hash operation that transforms an input of arbitrary length (also called pre-mapped pre-image) into an output of fixed length through a Hash algorithm, and the output is a Hash value. This transformation is a kind of compression mapping, i.e. the space of hash values is usually much smaller than the space of inputs, different inputs may hash to the same output, so it is not possible to determine a unique input value from a hash value. In short, it is a function of compressing a message of an arbitrary length to a message digest of a certain fixed length. MD5 and SHA-1 are the most widely used Hash algorithms, and they are designed based on MD 4.
A digital signature is some data appended to a data unit or a cryptographic transformation performed on a data unit. Such data or transformations allow the recipient of the data unit to verify the origin of the data unit and the integrity of the data unit and to protect the data against counterfeiting by a person (e.g., the recipient). Which is a method of signing a message in electronic form, a signed message being capable of being transmitted in a communication network. The digital signature can be obtained based on both a public key cryptosystem and a private key cryptosystem, and is mainly based on the public key cryptosystem. Including ordinary digital signatures and special digital signatures. Common digital signature algorithms include RSA, ElGamal, Fiat-Shamir, Guillou-Quisquarter, Schnorr, Ong-Schnorr-Shamir digital signature algorithm, Des/DSA, elliptic curve digital signature algorithm, finite automaton digital signature algorithm and the like. The special digital signature includes blind signature, proxy signature, group signature, undeniable signature, fair blind signature, threshold signature, signature with message recovery function, etc., and is closely related to a specific application environment.
FIG. 1 is a flowchart of an appointment information processing method according to the method of the embodiment of the present application. The method illustrated in fig. 1 may be performed by corresponding apparatus below, comprising:
step S100, acquiring appointment information msg to be stored, wherein the appointment information msg is generated from application software.
The appointment information msg may be any content such as a contract, a oath, a promise, a picture, and a text, and is not required to have legal effectiveness, and the embodiment of the present application does not specifically limit the appointment content. The application software may be social software such as WeChat and QQ, or shopping software such as Taobao and Techthyst, and the embodiment of the application is not particularly limited to the contents of the contract.
In step S102, a random key (Ai) is generated.
And step S104, encrypting the appointment information msg by using the random key Ai to obtain encrypted appointment information.
Step S106, calculating the hash value of the appointment information msg.
The hash value may be calculated based on multiple hash algorithms such as HAS1 and HAS256, and the embodiment of the present application does not specifically limit the content of the contract.
Step S108, the private key privatekey of the user is used for signing the hash value of the appointed information msg to obtain signature data.
The private key is distributed to the application software for the user, or can be generated by the user, and the embodiment of the application does not specifically limit the appointed content.
Step S110, uploading the hash values of the encryption contract information and the contract information msg to a blockchain.
The uploading of the hash values of the encryption contract information and the contract information msg to the blockchain may be according to a specific order. Of course, the signature data may also be uploaded to a blockchain, and a data frame composed of the encryption contract information, the hash value of the contract information (msg), and the signature data is uploaded to the blockchain in sequence. It should be understood that the significance of the evidence can be achieved whether the hash value of the contract information (msg) is uploaded into the blockchain or the signature data is uploaded into the blockchain.
In the step, chaining is carried out on the hash value of the appointed information (msg), and the reliability of the appointed certificate can be ensured by utilizing the data storage characteristics of tamper resistance and never loss of the block chain. The change of the contract information can cause the hash value of the corresponding irreversible check information contract information (msg) to change along with the change. In this step, the irreversible verification information of the contract voucher is uplinked, and the reliability of the contract voucher can be verified by using the irreversible verification information recorded by the block chain. For example, after the appointment information (msg) is called from the data provider, the hash value of the irreversible verification information appointment information (msg) of the appointment information (msg) can be calculated and obtained, and then the hash value is compared with the irreversible verification information recorded in the blockchain, if the hash value is inconsistent with the irreversible verification information recorded in the blockchain, it is indicated that the appointment voucher provided by the data provider is changed. Obviously, the above design may restrict malicious tampering of the provisioning voucher to some extent.
Based on the contract information processing method shown in fig. 1, it can be known that: according to the scheme of the embodiment of the application, when the appointment information is generated and the data is encrypted, the randomly generated encryption key is used every time, so that the data security is provided, and an internet service provider can not obtain the original data content of the user. The decentralized block chain is provided with a plurality of block chain nodes, more than half of the block chain nodes need to be damaged to tamper the promissory certificate or the irreversible verification information, and all the block chain nodes are damaged to delete the substrate of the promissory certificate or the irreversible verification information, which can not be realized theoretically, so that the effective and reliable evidence storage effect can be realized, and the user can conveniently store the promissory certificate for a long time.
The method of the embodiments of the present application is described in detail below.
The method of the embodiment of the application can provide an appointed program interface for the user, and the user acquires the appointed information through the program interface and uploads the encrypted appointed information and the hash value of the appointed information (msg). After the appointment information of the user is obtained, the hash value of the corresponding appointment information (msg) can be generated, the hash values of the appointment information and the appointment information (msg) are uploaded to a block chain, and the appointment evidence is stored by using decentralized, loss-proof and tamper-proof distributed data storage technology of the block chain.
As shown in fig. 2, the main process of the method in the embodiment of the present application includes:
step S200, acquiring appointment information msg to be stored, wherein the appointment information msg is generated from application software. The appointment information msg may be any content such as a contract, a oath, a commitment, a picture, and a text, and is not required to have legal effectiveness, and the embodiment of the present application does not specifically limit the appointment content. The application software may be social software such as WeChat and QQ, or shopping software such as Taobao and Techthyst, and the embodiment of the application is not particularly limited to the contents of the contract.
In step S201, a random number i is generated,
step S202, generating the random key (Ai) based on the random number i and the private key (privatekey) of the user.
The private key is distributed to the application software for the user, or can be generated by the user, and the embodiment of the application does not specifically limit the appointed content.
Performing a Hash operation (Hash) on the random number i and the private key (private key) of the user to generate the random key (Ai), for example: and Ai is Hash (privaekay, i).
Step S203, the random key Ai is used for encrypting the appointment information msg to obtain encrypted appointment information.
Step S204, calculating the hash value of the appointment information msg.
The hash value may be calculated based on multiple hash algorithms such as HAS1 and HAS256, and the embodiment of the present application does not specifically limit the content of the contract.
Step S205, sign the hash value of the agreed information msg using the private key privatekey of the user to obtain signature data.
Step S206, a data frame consisting of the random number i, the encryption contract information, the hash value of the contract information (msg) and the signature data is uploaded to a block chain according to the sequence.
The correspondence between the random number i and the random key (Ai) will be stored.
Fig. 3 is a schematic diagram of a structure of an upload block chain data frame according to an embodiment of the present application. In the second embodiment of the present application, a structure of a data frame composed of the random number i, the encryption contract information, the hash value of the contract information (msg), and the signature data in order is a schematic diagram of a data frame structure shown in fig. 3. Wherein i is a random number; enc _ Ai (msg) is data obtained by symmetrically encrypting appointment information msg by using Ai, wherein Ai is Hash (privatekay, i); h (msg) is the hash value of the appointment information msg; sig _ skA (H (msg)) is the result of a user signing the hash value of the provisioning information (msg) with his own private key.
The above is an introduction of an application scenario of the embodiment of the present application. It will be appreciated that appropriate modifications may be made without departing from the principles outlined herein, and such modifications are intended to be included within the scope of the embodiments herein. For example, the random number i, the encryption contract information, the hash value of the contract information (msg), and the signature data may be assigned for uplink by a terminal device of a user.
In correspondence with the above method, as shown in fig. 4, an embodiment of the present application further provides an appointment information processing apparatus 40 based on a block chain, including:
an information obtaining module 400, configured to obtain appointment information (msg) to be stored, where the appointment information is generated from application software;
a random number generation module 401, configured to generate a random number i;
a key generation module 402 for generating a random key (Ai);
an encryption module 403, configured to encrypt the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
a hash calculation module 404 for calculating a hash value of the commitment information (msg);
a digital signature module 405, configured to sign the hash value of the agreed information (msg) using a private key (privatekey) of the user to obtain signature data;
an upload module 406, configured to upload the hash values of the encryption contract information and the contract information (msg) into a block chain.
Based on the contract information processing apparatus shown in fig. 4, it can be known that: according to the scheme of the embodiment of the application, when the appointment information is generated and the data is encrypted, the randomly generated encryption key is used every time, so that the data security is provided, and an internet service provider can not obtain the original data content of the user. The decentralized block chain is provided with a plurality of block chain nodes, more than half of the block chain nodes need to be damaged to tamper the promissory certificate or the irreversible verification information, and all the block chain nodes are damaged to delete the substrate of the promissory certificate or the irreversible verification information, which can not be realized theoretically, so that the effective and reliable evidence storage effect can be realized, and the user can conveniently store the promissory certificate for a long time.
Optionally, the appointment information processing apparatus 40 in the embodiment of the present application may further include a data frame examination module, configured to combine, in order, the random number i, the encryption appointment information, the hash value of the appointment information (msg), and the signature data into a data frame; an upload module 406, configured to upload the data frame to a block chain.
Optionally, the appointment information processing apparatus 40 according to the embodiment of the present application may further include a data frame examination module, configured to combine the encrypted appointment information and the hash value of the appointment information (msg) into a data frame in sequence; an upload module 406, configured to upload the data frame to a block chain.
Optionally, the appointment information processing apparatus 40 in the embodiment of the present application may further include a corresponding storage module, which is to store a corresponding relationship between the random number i and the random key (Ai).
The appointment information msg may be any content such as an appointment, a oath, an appointment, a picture, a text, etc., and is not required to have legal effectiveness, and the embodiment of the present application does not specifically limit the appointment content. The application software can be social software such as WeChat and QQ, shopping software such as Taobao and Techthyst, the embodiment of the application does not specifically limit the appointed content, the hash value can be calculated based on a plurality of hash algorithms such as HAS1 and HAS256, and the embodiment of the application does not specifically limit the appointed content.
Obviously, the provisioning information processing apparatus according to the embodiment of the present application may be an execution subject of the provisioning information processing method shown in fig. 1, and thus the provisioning information processing apparatus can implement the functions of the method implemented in fig. 1 to fig. 3. Since the principle is the same, the detailed description is omitted here.
FIG. 5 is a block diagram of a provisioning information processing system according to an embodiment of the present application. The contract information processing system includes: a service platform 501, a user equipment 502, and a blockchain 503. Wherein:
the service platform 501 is configured to provide an application service to the user equipment, and send appointment information (msg) 5001;
the user equipment 502 is configured to obtain the appointment information (msg) to be deposited; generating a random key (Ai); encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information; calculating a hash value of the commitment information (msg); signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data; uploading the hash values of the encryption contract information and the contract information (msg) to a blockchain 5002;
the block chain 503 is configured to store the encryption contract information and the hash value of the contract information (msg).
Optionally, the user equipment 502 in this embodiment of the present application may be further configured to compose a data frame by the random number i, the encryption contract information, the hash value of the contract information (msg), and the signature data in sequence, and upload the data frame to a block chain.
Optionally, the user equipment 502 in this embodiment of the present application may be further configured to a data frame examination module, configured to combine the encryption contract information and the hash value of the contract information (msg) into a data frame according to a sequence, and upload the data frame to a block chain.
Optionally, the user equipment 502 in this embodiment of the application may be further configured to store a corresponding relationship between the random number i and the random key (Ai).
Based on the contract information processing system shown in fig. 5, it can be known that: according to the scheme of the embodiment of the application, when the appointment information is generated and the data is encrypted, the randomly generated encryption key is used every time, so that the data security is provided, and an internet service provider can not obtain the original data content of the user. The decentralized block chain is provided with a plurality of block chain nodes, more than half of the block chain nodes need to be damaged to tamper the promissory certificate or the irreversible verification information, and all the block chain nodes are damaged to delete the substrate of the promissory certificate or the irreversible verification information, which can not be realized theoretically, so that the effective and reliable evidence storage effect can be realized, and the user can conveniently store the promissory certificate for a long time.
The method of the embodiment of the present application is described below by way of example in conjunction with an actual application scenario.
And after the Alice transfers the money to Bob through the WeChat, intercepting a remittance page msg and intending to store evidence.
The Alice user device generates a random number i,
the Alice user equipment generates the random key (Ai) based on the random number i and the user private key; wherein the random key (Ai) is generated by performing a Hash operation (Hash) on the random number i and the private key (privatekey) of the user. For example: hash (privatekay, i)
And the Alice user equipment encrypts the remittance page msg by using the random secret key Ai to obtain encryption appointment information.
And the Alice user equipment calculates the hash value of the remittance page msg.
The hash value may be calculated based on multiple hash algorithms such as HAS1 and HAS256, and the embodiment of the present application does not specifically limit the content of the contract.
And the Alice user equipment signs the hash value of the remittance page msg by using the private key privatekey of the user to obtain signature data.
And the Alice user equipment uploads a data frame consisting of the random number i, the encryption appointment information, the hash value of the remittance page msg and the signature data to a block chain according to the sequence.
The Alice user equipment stores the corresponding relation between the random number i and the random secret key (Ai).
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application. Referring to fig. 6, at a hardware level, the electronic device includes a processor, and optionally further includes an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory, such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be connected to each other via an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (peripheral component Interconnect) bus, an EISA (extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 6, but that does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads the corresponding computer program from the nonvolatile memory into the memory and then runs the computer program to form the convention information processing device on the logic level. The processor is used for executing the program stored in the memory and is specifically used for executing the following operations:
memory, a processor, and a computer program stored on the memory and executable on the processor, the computer program being executed by the processor:
acquiring appointment information (msg) to be stored, wherein the appointment information is generated from application software;
generating a random key (Ai);
encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
calculating a hash value of the commitment information (msg);
signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data;
uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain.
Based on the electronic device shown in fig. 6, it can be known that: according to the scheme of the embodiment of the application, when the appointment information is generated and the data is encrypted, the randomly generated encryption key is used every time, so that the data security is provided, and an internet service provider can not obtain the original data content of the user. The decentralized blockchain is provided with a plurality of blockchain nodes, more than half of blockchain link points are damaged to tamper the promissory certificate or the irreversible verification information, and all the blockchain link points are damaged to delete the substrate of the promissory certificate or the irreversible verification information, so that the promissory certificate or the irreversible verification information can not be theoretically deleted, therefore, the effective and reliable evidence storage effect can be achieved, and a user can conveniently store the promissory certificate or the irreversible verification information for a long time.
The method for processing the contract information disclosed in the embodiment of fig. 1 of the present application may be applied to a processor, or may be implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CpU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module can be located in a random access memory, a flash memory, a read only memory, a programmable read only memory or an electrically erasable programmable memory, a register and other storage media mature in the field. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
It should be understood that the electronic device according to the embodiment of the present application may implement the functions of the aforementioned conventional information processing apparatus in the embodiments shown in fig. 1 to fig. 3, which are not described herein again.
Of course, besides the software implementation, the electronic device of the present application does not exclude other implementations, such as a logic device or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or a logic device.
Furthermore, an embodiment of the present application also provides a computer-readable storage medium storing one or more programs, where the one or more programs include instructions, which, when executed by a portable electronic device including a plurality of application programs, can cause the portable electronic device to perform the method of the embodiment shown in fig. 1, and is specifically configured to perform the following method:
acquiring appointment information (msg) to be stored, wherein the appointment information is generated from application software;
generating a random key (Ai);
encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
calculating a hash value of the commitment information (msg);
signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data;
uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain.
It should be understood that the above-mentioned instructions, when executed by a portable electronic device including a plurality of application programs, can enable the above-mentioned agreed information processing method apparatus to implement the functions of the embodiments shown in fig. 1-4, which are not described herein again.
As will be appreciated by one skilled in the art, the embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, the description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The above description is only an example of the present specification, and is not intended to limit the present specification. Various modifications and alterations to this description will become apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present specification should be included in the scope of the claims of the present specification.

Claims (13)

1. A method for processing appointed information based on a block chain comprises the following steps:
acquiring appointment information (msg) to be stored, wherein the appointment information is generated from application software;
generating a random key (Ai);
encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
calculating a hash value of the commitment information (msg);
signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data;
uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain.
2. The method of claim 1,
and uploading the signature data to a block chain.
3. The method of claim 2,
said generating a random key (Ai) comprises:
a random number i is generated and,
generating the random key (Ai) based on the random number i and the private key (privatekey) of the user.
4. The method of claim 3,
and carrying out Hash operation (Hash) on the random number i and the private key (private key) of the user to generate the random key (Ai).
5. The method of claim 3,
and uploading the random number i to a block chain.
6. The method of claim 2,
and uploading a data frame consisting of the encryption contract information, the hash value of the contract information (msg) and the signature data to a block chain according to the sequence.
7. The method of claim 3,
and uploading a data frame consisting of the random number i, the encryption contract information, the hash value of the contract information (msg) and the signature data to a block chain according to the sequence.
8. The method of claim 3,
the correspondence between the random number i and the random key (Ai) will be stored.
9. An appointment information processing apparatus based on a block chain, comprising:
the system comprises an information acquisition module, a storage module and a processing module, wherein the information acquisition module is used for acquiring appointment information (msg) to be stored, and the appointment information is generated from application software;
a key generation module for generating a random key (Ai);
the encryption module is used for encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
a hash calculation module for calculating a hash value of the appointment information (msg);
the digital signature module is used for signing the hash value of the agreed information (msg) by using a private key (privatekey) of a user to obtain signature data;
an upload module for uploading the hash values of the encryption contract information and the contract information (msg) into a block chain.
10. An appointment information processing system comprising: user equipment, a service platform and a block chain;
the service platform is used for providing application service for the user equipment and sending appointment information (msg);
the user equipment is used for acquiring the appointment information (msg) to be stored; generating a random key (Ai); encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information; calculating a hash value of the commitment information (msg); signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data; uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain;
the block chain is used for storing the encryption contract information and the hash value of the contract information (msg).
11. The system of claim 10,
the user equipment is used for storing the corresponding relation between the random number i and the random key (Ai).
12. An electronic device includes: a memory, a processor, and a computer program stored on the memory and executable on the processor, the computer program being executed by the processor to:
acquiring appointment information (msg) to be stored, wherein the appointment information is generated from application software;
generating a random key (Ai);
encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
calculating a hash value of the commitment information (msg);
signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data;
uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain.
13. A computer-readable storage medium having a computer program stored thereon, which when executed by a processor, performs the steps of:
acquiring appointment information (msg) to be stored, wherein the appointment information is generated from application software;
generating a random key (Ai);
encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
calculating a hash value of the commitment information (msg);
signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data;
uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain.
CN201910850833.XA 2019-09-10 2019-09-10 Appointment information processing method, device and system based on block chain and electronic equipment Active CN110601848B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910850833.XA CN110601848B (en) 2019-09-10 2019-09-10 Appointment information processing method, device and system based on block chain and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910850833.XA CN110601848B (en) 2019-09-10 2019-09-10 Appointment information processing method, device and system based on block chain and electronic equipment

Publications (2)

Publication Number Publication Date
CN110601848A true CN110601848A (en) 2019-12-20
CN110601848B CN110601848B (en) 2022-11-25

Family

ID=68858412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910850833.XA Active CN110601848B (en) 2019-09-10 2019-09-10 Appointment information processing method, device and system based on block chain and electronic equipment

Country Status (1)

Country Link
CN (1) CN110601848B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259413A (en) * 2020-01-10 2020-06-09 上海旺链信息科技有限公司 Data management method and device based on block chain
CN112001727A (en) * 2020-07-30 2020-11-27 律众法宝(北京)网络数据科技有限责任公司 Method, device and storage medium for storing certificate of transaction
CN112003694A (en) * 2020-08-10 2020-11-27 杭州溪塔科技有限公司 License ticket issuing method, system, electronic device and medium based on block chain
CN112380269A (en) * 2020-10-28 2021-02-19 杭州链城数字科技有限公司 Identity card information inquiry and evidence fixing and obtaining method based on block chain
CN114338047A (en) * 2022-03-08 2022-04-12 科大天工智能装备技术(天津)有限公司 Block chain industrial data encryption method and device based on state cipher and storage medium
CN116561739A (en) * 2023-04-06 2023-08-08 北京熠智科技有限公司 Data transaction method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method
AU2017222470A1 (en) * 2016-02-23 2018-08-30 nChain Holdings Limited Tokenisation method and system for implementing exchanges on a blockchain
US20190036692A1 (en) * 2016-07-29 2019-01-31 Trusted Key Solutions Inc. System and method for generating a recovery key and managing credentials using a smart blockchain contract
US20190173854A1 (en) * 2017-11-22 2019-06-06 Michael Beck Decentralized information sharing network
CN109951453A (en) * 2019-02-26 2019-06-28 符安文 A kind of safe encryption method based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method
AU2017222470A1 (en) * 2016-02-23 2018-08-30 nChain Holdings Limited Tokenisation method and system for implementing exchanges on a blockchain
US20190036692A1 (en) * 2016-07-29 2019-01-31 Trusted Key Solutions Inc. System and method for generating a recovery key and managing credentials using a smart blockchain contract
US20190173854A1 (en) * 2017-11-22 2019-06-06 Michael Beck Decentralized information sharing network
CN109951453A (en) * 2019-02-26 2019-06-28 符安文 A kind of safe encryption method based on block chain

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259413A (en) * 2020-01-10 2020-06-09 上海旺链信息科技有限公司 Data management method and device based on block chain
CN112001727A (en) * 2020-07-30 2020-11-27 律众法宝(北京)网络数据科技有限责任公司 Method, device and storage medium for storing certificate of transaction
CN112003694A (en) * 2020-08-10 2020-11-27 杭州溪塔科技有限公司 License ticket issuing method, system, electronic device and medium based on block chain
CN112003694B (en) * 2020-08-10 2023-06-23 杭州溪塔科技有限公司 License issuing method, system, electronic equipment and medium based on blockchain
CN112380269A (en) * 2020-10-28 2021-02-19 杭州链城数字科技有限公司 Identity card information inquiry and evidence fixing and obtaining method based on block chain
CN114338047A (en) * 2022-03-08 2022-04-12 科大天工智能装备技术(天津)有限公司 Block chain industrial data encryption method and device based on state cipher and storage medium
CN116561739A (en) * 2023-04-06 2023-08-08 北京熠智科技有限公司 Data transaction method and device, electronic equipment and storage medium
CN116561739B (en) * 2023-04-06 2024-04-16 北京熠智科技有限公司 Data transaction method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN110601848B (en) 2022-11-25

Similar Documents

Publication Publication Date Title
CN110601848B (en) Appointment information processing method, device and system based on block chain and electronic equipment
US11811912B1 (en) Cryptographic algorithm status transition
CN109194466B (en) Block chain-based cloud data integrity detection method and system
US11907406B2 (en) Computer-implemented method and system of tamper-evident recording of a plurality of service data items
Barsoum et al. Enabling dynamic data and indirect mutual trust for cloud computing storage systems
CA2408639C (en) Method and apparatus for self-authenticating digital records
CN112446785A (en) Cross-chain transaction method, system, device, equipment and storage medium
CN107770159B (en) Vehicle accident data recording method and related device and readable storage medium
CN110096901B (en) Electronic contract data encryption storage method and signing client
JPWO2018168723A1 (en) Device authentication technology on the network
JP2004280284A (en) Control processor, electronic equipment, and program starting method for electronic equipment, and system module updating method for electronic equipment
CN110881063A (en) Storage method, device, equipment and medium of private data
CN112907375B (en) Data processing method, device, computer equipment and storage medium
CN111130751A (en) Appointment information processing method, device and system based on block chain and electronic equipment
US20160149708A1 (en) Electronic signature system
CN110969207A (en) Electronic evidence processing method, device, equipment and storage medium
CN112202779B (en) Block chain based information encryption method, device, equipment and medium
CN113610526A (en) Data trust method and device, electronic equipment and storage medium
CN114785524B (en) Electronic seal generation method, device, equipment and medium
CN112734423A (en) Transaction method based on block chain and terminal equipment
CN109978543B (en) Contract signing method and device, electronic equipment and storage medium
CN112184441A (en) Data processing method, data processing device, node equipment and storage medium
KR20220079751A (en) Smart Contract System Using External Storage Based on Blockchain And Method Therefor
CN112597117B (en) File sharing method, related device and file sharing system
US20110208969A1 (en) Method and apparatus for providing authenticity and integrity to stored data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230731

Address after: Room 3901, No. 701, Yunjin Road, Xuhui District, Shanghai, 200030

Patentee after: Shanghai Shutu blockchain Research Institute

Address before: No. 0601, Floor 06, Building D, Tsinghua Tongfang Science and Technology Building, No.1 Wangzhuang Road, Haidian District, Beijing 100089

Patentee before: Beijing Qinghong Weigu Technology Development Co.,Ltd.

TR01 Transfer of patent right