CN111130751A - Appointment information processing method, device and system based on block chain and electronic equipment - Google Patents

Appointment information processing method, device and system based on block chain and electronic equipment Download PDF

Info

Publication number
CN111130751A
CN111130751A CN201911064199.3A CN201911064199A CN111130751A CN 111130751 A CN111130751 A CN 111130751A CN 201911064199 A CN201911064199 A CN 201911064199A CN 111130751 A CN111130751 A CN 111130751A
Authority
CN
China
Prior art keywords
information
msg
user
appointment
appointment information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911064199.3A
Other languages
Chinese (zh)
Inventor
尚书
王淋
伍鸣
杨光
龙凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Yuncui Liutu Network Technology Co Ltd
Original Assignee
Hangzhou Yuncui Liutu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Yuncui Liutu Network Technology Co Ltd filed Critical Hangzhou Yuncui Liutu Network Technology Co Ltd
Priority to CN201911064199.3A priority Critical patent/CN111130751A/en
Publication of CN111130751A publication Critical patent/CN111130751A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application provides a method, a device and a system for processing appointed information based on a block chain and electronic equipment. The method comprises the following steps: acquiring appointment information (msg) to be stored, wherein the appointment information is generated from application software; generating a random key (Ai) generated based on a biometric identification of a user of the appointment information (msg); encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information; calculating a hash value of the commitment information (msg); signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data; uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain.

Description

Appointment information processing method, device and system based on block chain and electronic equipment
Technical Field
The embodiment of the application relates to the technical field of block chains, in particular to a block chain-based appointed information processing method, device and system and electronic equipment.
Background
People often establish various conventions with others in social contact, and the conventions have evidence-saving significance whether formally proposed or orally proposed. Evidence may, but need not, be legally effective as a witness to an appointment as the name suggests.
At present, there are two main methods for storing certificates, one is non-electronic certificate based on traditional media (such as paper), and the other is electronic certificate based on centralized computer storage media. The former is inconvenient to store for a long time and has a risk of loss, and the latter cannot guarantee that the recorded appointed content cannot be maliciously tampered/deleted. In view of this, how to provide a lively anti-loss and anti-tamper promissory evidence-storing service is a technical problem to be solved at present.
The block chain technology is a novel application technology set of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. From the data perspective, the block chain combines the data blocks in a sequential connection mode into a chain data structure according to the time sequence, and the data structure is guaranteed to be not falsifiable and not to be forged in a cryptographic mode. From a technical perspective, the blockchain technology integrates a plurality of different technologies, and by constructing a blockchain network, each node in the network is allowed to obtain a complete copy of a data block, and updates of the blockchain-based data blocks are maintained based on a consensus mechanism and competition calculation. Therefore, the decentralization and the distrust of data storage and management are realized through an end-to-end network formed by multi-node communication.
In the prior art, original data content is stored in a block chain, and an administrator of an internet service provider masters absolute control authority of a system, so that the internet service provider can completely acquire the original data content of a user and modify the original data content, and the security of the original data content of the user is low.
Disclosure of Invention
The embodiment of the application aims to provide a block chain-based contract information processing method, a block chain-based contract information processing device and electronic equipment, and the method, the device and the electronic equipment can provide a life-activated contract evidence storage service for preventing loss and tampering.
In order to achieve the above purpose, the embodiments of the present application are implemented as follows:
in a first aspect, a method for processing contracted information based on a block chain is provided, including:
acquiring appointment information (msg) to be stored, wherein the appointment information is generated from application software;
generating a random key (Ai) generated based on a biometric identification of a user of the appointment information (msg);
encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
calculating a hash value of the commitment information (msg);
signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data;
uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain.
In a second aspect, an apparatus for handling provisioning information based on a block chain is provided, including:
the system comprises an information acquisition module, a storage module and a processing module, wherein the information acquisition module is used for acquiring appointment information (msg) to be stored, and the appointment information is generated from application software;
a key generation module for generating a random key (Ai) generated based on a biometric identification of the user of the engagement information (msg);
the encryption module is used for encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
a hash calculation module for calculating a hash value of the appointment information (msg);
the digital signature module is used for signing the hash value of the agreed information (msg) by using a private key (privatekey) of a user to obtain signature data;
an upload module for uploading the hash values of the encryption contract information and the contract information (msg) into a block chain.
In a third aspect, there is provided an appointment information processing system, comprising: user equipment, a service platform and a block chain;
the service platform is used for providing application service for the user equipment and sending appointment information (msg);
the user equipment is used for acquiring the appointment information (msg) to be stored; generating a random key (Ai); encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information; calculating a hash value of the commitment information (msg); signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data; uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain;
the block chain is used for storing the encryption contract information and the hash value of the contract information (msg).
In a fourth aspect, an electronic device is provided comprising: a memory, a processor, and a computer program stored on the memory and executable on the processor, the computer program being executed by the processor to:
acquiring appointment information (msg) to be stored, wherein the appointment information is generated from application software;
generating a random key (Ai) generated based on a biometric identification of a user of the appointment information (msg);
encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
calculating a hash value of the commitment information (msg);
signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data;
uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain.
In a fifth aspect, a computer-readable storage medium is provided, having stored thereon a computer program which, when executed by a processor, performs the steps of:
acquiring appointment information (msg) to be stored, wherein the appointment information is generated from application software;
generating a random key (Ai);
encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
calculating a hash value of the commitment information (msg);
signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data;
uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain.
According to the scheme of the embodiment of the application, when the appointment information is generated and data is encrypted, the encryption key generated by the biological identification of the user based on the appointment information (msg) is used each time, so that the data security is provided, and an internet service provider can not obtain the original data content and the encryption key of the user at all. Because the human body characteristics have the unique characteristic of non-duplicable nature inherent to the human body, the biological identification cannot be duplicated, stolen or forgotten, and the encryption key generated by utilizing the biological identification technology has extremely high confidentiality. Meanwhile, the decentralized block chain is provided with a plurality of block chain nodes, more than half of the block chain nodes are damaged to tamper the promissory certificate or the irreversible verification information, and all the block chain nodes are damaged to delete the substrate of the promissory certificate or the irreversible verification information, which can not be realized theoretically, so that the effective and reliable certificate storage effect can be realized, and the user can conveniently store the certificate for a long time.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative efforts.
Fig. 1 is a schematic flow chart of a contract information processing method according to an embodiment of the present application.
Fig. 2 is a schematic flow chart of a second method for processing provisioning information according to an embodiment of the present application.
Fig. 3 is a schematic diagram of a structure of an upload block chain data frame according to an embodiment of the present application.
Fig. 4 is a schematic structural diagram of an appointment information processing apparatus according to an embodiment of the present application.
Fig. 5 is a schematic structural diagram of an appointment information processing system according to an embodiment of the present application.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
As mentioned above, there are two main methods for providing evidence for contract, one is non-electronic evidence based on traditional media, and the other is electronic evidence based on centralized computer storage media. The former is inconvenient to store for a long time and has a risk of loss, and the latter cannot guarantee that the recorded appointed content cannot be maliciously tampered/deleted.
Meanwhile, in the existing blockchain technology, original data content is stored in a blockchain, and an internet service provider administrator grasps absolute control authority of a system, so that the internet service provider can completely acquire the original data content of a user and modify the original data content, and the security of the original data content of the user is low.
Therefore, the application aims to provide a living anti-loss and anti-tampering promissory evidence storage scheme.
Hash operation Hash is the process of converting an input of arbitrary length (also called pre-mapped pre-image) into an output of fixed length by a Hash algorithm, and the output is a Hash value. This transformation is a kind of compression mapping, i.e. the space of hash values is usually much smaller than the space of inputs, different inputs may hash to the same output, so it is not possible to determine a unique input value from a hash value. In short, it is a function of compressing a message of an arbitrary length to a message digest of a certain fixed length. MD5 and SHA-1 are the most widely used Hash algorithms, and they are designed based on MD 4.
A digital signature is some data appended to a data unit or a cryptographic transformation performed on a data unit. Such data or transformations allow the recipient of the data unit to verify the source of the data unit and the integrity of the data unit and to protect the data against counterfeiting by a person (e.g., the recipient). Which is a method of signing a message in electronic form, a signed message being capable of being transmitted in a communication network. The digital signature can be obtained based on both a public key cryptosystem and a private key cryptosystem, and is mainly based on the public key cryptosystem. Including ordinary digital signatures and special digital signatures. Common digital signature algorithms include RSA, ElGamal, Fiat-Shamir, Guillou-Quisquarter, Schnorr, Ong-Schnorr-Shamir digital signature algorithm, Des/DSA, elliptic curve digital signature algorithm, finite automaton digital signature algorithm and the like. The special digital signature includes blind signature, proxy signature, group signature, undeniable signature, fair blind signature, threshold signature, signature with message recovery function, etc., and is closely related to a specific application environment.
FIG. 1 is a flowchart of an appointment information processing method according to the method of the embodiment of the present application. The method shown in fig. 1 may be performed by a corresponding apparatus, comprising:
step S100, acquiring appointment information msg to be stored, wherein the appointment information msg is generated from application software.
The appointment information msg may be any content such as a contract, a oath, a commitment, a picture, and a text, and is not required to have legal effectiveness, and the embodiment of the present application does not specifically limit the appointment content. The application software may be social software such as WeChat and QQ, or shopping software such as Taobao and Techthyst, and the embodiment of the application is not particularly limited to the contents of the contract.
Step S102, a random key Ai is generated, and the random key Ai is generated based on the biological identification of the user of the appointment information msg.
And step S104, encrypting the appointment information msg by using the random key Ai to obtain encrypted appointment information.
Step S106, calculating the hash value of the appointment information msg.
The hash value may be calculated based on multiple hash algorithms such as HAS1 and HAS256, and the embodiment of the present application does not specifically limit the content of the contract.
Step S108, the private key privatekey of the user is used for signing the hash value of the appointed information msg to obtain signature data.
The private key is distributed to the application software for the user, and can also be generated by the user, and the embodiment of the application does not specifically limit the appointed content.
Step S110, uploading the hash values of the encryption contract information and the contract information msg to a block chain.
The encryption contract information and the hash value of the contract information msg are uploaded to the block chain according to a specific sequence. Of course, the signature data may also be uploaded to a block chain, and a data frame composed of the encryption contract information, the hash value of the contract information msg, and the signature data is uploaded to the block chain in sequence. It should be understood that the meaning of evidence storage can be achieved whether the hash value of the convention information msg is uploaded into the blockchain or the signature data is uploaded into the blockchain.
In the step, chaining is carried out on the hash value of the appointed information msg, and the reliability of the appointed certificate can be ensured by utilizing the data storage characteristics of tamper resistance and never loss of the block chain. The change of the contract information can cause the hash value of the corresponding irreversible check information contract information msg to change along with the change. In this step, the irreversible verification information of the contract voucher is uplinked, and the reliability of the contract voucher can be verified by using the irreversible verification information recorded by the block chain. For example, after the appointment information msg is called from the data provider, the hash value of the irreversible verification information msg of the appointment information msg can be calculated and obtained, then the hash value is compared with the irreversible verification information recorded in the blockchain, and if the hash value is inconsistent with the irreversible verification information recorded in the blockchain, it is indicated that the appointment voucher provided by the data provider is changed. Obviously, the above design may restrict malicious tampering of the provisioning voucher to a certain extent.
Based on the contract information processing method shown in fig. 1, it can be known that: according to the scheme of the embodiment of the application, when the appointment information is generated and data is encrypted, the encryption key generated by the biological identification of the user based on the appointment information msg is used every time, so that the data security is provided, and an internet service provider can not obtain the original data content and the encryption key of the user at all. The decentralized block chain is provided with a plurality of block chain nodes, more than half of the block chain nodes are damaged to tamper the promissory certificate or the irreversible verification information, and all the block chain nodes are damaged to delete the substrate of the promissory certificate or the irreversible verification information, so that the promissory certificate or the irreversible verification information can not be theoretically deleted, therefore, the effective and reliable evidence storage effect can be achieved, and a user can conveniently store the promissory certificate or the irreversible verification information for a long time.
The method of the embodiments of the present application is described in detail below.
The method of the embodiment of the application can provide an appointed program interface for the user, and the user acquires the appointed information through the program interface and uploads the encrypted appointed information and the hash value of the appointed information msg. After the appointed information of the user is obtained, the hash value of the corresponding appointed information msg can be generated, the hash values of the appointed information msg and the appointed information msg are uploaded to a block chain, and the appointed certificate is stored by using decentralized, loss-proof and tamper-proof distributed data storage technology of the block chain.
As shown in fig. 2, the main process of the method in the embodiment of the present application includes:
step S200, acquiring appointment information msg to be stored, wherein the appointment information msg is generated from application software. The appointment information msg may be any content such as a contract, a oath, a commitment, a picture, and a text, and is not required to have legal effectiveness, and the embodiment of the present application does not specifically limit the appointment content. The application software may be social software such as WeChat and QQ, or shopping software such as Taobao and Techthyst, and the embodiment of the application is not particularly limited to the contents of the contract.
Step S201, collecting the biological identification of the user, and preprocessing the biological identification to obtain a digital code i. The biological identification is one of fingerprint, face and voice of the user. In the following, we will use fingerprint identification as an example for detailed description.
At present, most of intelligent terminals are provided with fingerprint identification systems, fingerprint identification sensors collect fingerprint information, and the collected information is compared with fingerprint data in a fingerprint database so as to achieve the purpose of fingerprint identification. The main implementation modes of the fingerprint sensor are three types: optical sensing technology, capacitive sensing technology, and ultrasonic sensing technology.
The application software prompts a user to input a fingerprint, and the intelligent terminal acquires a fingerprint image through a fingerprint sensor; preprocessing the fingerprint image to obtain fingerprint ridge lines and extracting characteristic points; and digitally coding the characteristic points to obtain i. Since each user's fingerprint is different, the fingerprint identification number code i of each user is also different.
Step S202, the random key Ai is generated based on the digital code i of the biological identification and the private key privatekey of the user.
The private key is distributed to the application software for the user, and can also be generated by the user, and the embodiment of the application does not specifically limit the appointed content.
Performing Hash operation Hash on the digital code i of the biometric identifier and the private key of the user to generate the random key Ai, for example: and Ai is Hash (privatekay, i).
Step S203, the random key Ai is used for encrypting the appointment information msg to obtain encrypted appointment information.
Step S204, calculating the hash value of the appointment information msg.
The hash value may be calculated based on multiple hash algorithms such as HAS1 and HAS256, and the embodiment of the present application does not specifically limit the content of the contract.
Step S205, sign the hash value of the agreed information msg using the private key privatekey of the user to obtain signature data.
Step S206, the encryption appointment information, the hash value of the appointment information msg and the signature data are uploaded to a block chain to form a data frame according to the sequence.
And storing the corresponding relation between the digital code i of the biological identification and the random secret key Ai.
Fig. 3 is a schematic diagram of a structure of an upload block chain data frame according to an embodiment of the present application. In the second embodiment of the present application, a structure of a data frame formed by the encryption contract information, the hash value of the contract information msg, and the signature data in sequence is a data frame structure diagram shown in fig. 3. Enc _ Ai (msg) is data obtained by symmetrically encrypting appointment information msg by using Ai, wherein Ai is Hash (privatekay, i); h (msg) is the hash value of the appointment information msg; sig _ skA (H (msg)) is a signature result of a hash value of the agreed information msg by a user by using a private key of the user.
The above is an introduction of an application scenario of the embodiment of the present application. It will be appreciated that appropriate modifications may be made without departing from the principles outlined herein, and such modifications are intended to be included within the scope of the embodiments herein. For example, the digital code i of the biometric identifier, the encryption contract information, the hash value of the contract information msg, and the signature data may be used by the terminal device of the user for uplink transmission.
In correspondence with the above method, as shown in fig. 4, an embodiment of the present application further provides an appointment information processing apparatus 40 based on a block chain, including:
the information acquisition module 400 is configured to acquire appointment information msg to be stored, where the appointment information msg is generated from application software;
the biometric identifier acquiring module 401 is configured to acquire a biometric identifier of a user, and preprocess the biometric identifier to obtain a digital code i, where the biometric identifier is one of a fingerprint, a face, and a voice of the user.
A key generation module 402 for generating a random key Ai; performing Hash operation Hash on the digital code i of the biological identifier and the private key of the user to generate the random key Ai, for example: and Ai is Hash (privatekay, i).
An encryption module 403, configured to encrypt the appointment information msg by using the random key Ai to obtain encrypted appointment information;
a hash calculation module 404, configured to calculate a hash value of the appointment information msg;
the digital signature module 405 is configured to sign the hash value of the agreed information msg by using a private key privatekey of the user to obtain signature data;
an upload module 406, configured to upload the hash values of the encryption contract information and the contract information (msg) into a block chain.
Based on the contract information processing apparatus shown in fig. 4, it can be known that: according to the scheme of the embodiment of the application, when the appointment information is generated and the data is encrypted, the randomly generated encryption key is used every time, so that the data security is provided, and an internet service provider can not obtain the original data content of the user. The decentralized block chain is provided with a plurality of block chain nodes, more than half of the block chain nodes are damaged to tamper the promissory certificate or the irreversible verification information, and all the block chain nodes are damaged to delete the substrate of the promissory certificate or the irreversible verification information, so that the promissory certificate or the irreversible verification information can not be theoretically deleted, therefore, the effective and reliable evidence storage effect can be achieved, and a user can conveniently store the promissory certificate or the irreversible verification information for a long time.
Optionally, the appointment information processing apparatus 40 according to the embodiment of the present application may further include a data frame examination module, configured to combine the encrypted appointment information, the hash value of the appointment information (msg), and the signature data into a data frame in order; an upload module 406, configured to upload the data frame to a block chain.
Optionally, the appointment information processing apparatus 40 according to the embodiment of the present application may further include a data frame examination module, configured to combine the encrypted appointment information and the hash value of the appointment information (msg) into a data frame in sequence; an upload module 406, configured to upload the data frame to a block chain.
Optionally, the appointment information processing apparatus 40 according to the embodiment of the present application may further include a correspondence storage module, which is to store a correspondence between the digital code (i) of the biometric identifier and the random key (Ai).
The appointment information msg may be any content such as an appointment, a oath, an appointment, a picture, a text, etc., and is not required to have legal effectiveness, and the embodiment of the present application does not specifically limit the appointment content. The application software can be social software such as WeChat and QQ, shopping software such as Taobao and Techthyst, the appointed content is not specifically limited in the embodiment of the application, the hash value can be calculated based on a plurality of hash algorithms such as HAS1 and HAS256, and the appointed content is not specifically limited in the embodiment of the application.
Obviously, the appointment information processing apparatus according to the embodiment of the present application may be used as the executing main body of the appointment information processing method shown in fig. 1, and thus the appointment information processing apparatus can implement the functions of the method implemented in fig. 1 to fig. 3. Since the principle is the same, the detailed description is omitted here.
FIG. 5 is a block diagram of a provisioning information processing system according to an embodiment of the present application. The contract information processing system includes: a service platform 501, a user equipment 502, and a blockchain 503. Wherein:
the service platform 501 is configured to provide an application service to the ue, and in step 5001, send appointment information (msg);
the user equipment 502 is configured to obtain the appointment information msg to be stored; acquiring a biological identifier of a user, preprocessing the biological identifier to obtain a digital code i, wherein the biological identifier is one of a fingerprint, a face and a voice of the user; performing Hash operation Hash on the digital code i of the biological identifier and the private key of the user to generate the random key Ai, for example: hash (privatekay, i); generating a random key Ai; encrypting the appointed information msg by using the random key Ai to obtain encrypted appointed information; calculating a hash value of the appointed information msg; signing the hash value of the appointed information msg by using a private key privatekey of a user to obtain signature data; in step 5002, uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain;
the block chain 503 is configured to store the hash values of the encryption contract information and the contract information msg.
Optionally, the user equipment 502 in this embodiment of the present application may be further configured to compose a data frame by the encryption contract information, the hash value of the contract information msg, and the signature data in sequence, and upload the data frame to a block chain.
Optionally, the user equipment 502 of the embodiment of the present application may be further configured to store a corresponding relationship between the digital code i of the biometric identifier and the random key Ai.
Based on the contract information processing system shown in fig. 5, it can be known that: according to the scheme of the embodiment of the application, when the appointment information is generated and data is encrypted, the encryption key generated by the biological identification of the user based on the appointment information msg is used every time, so that the data security is provided, and an internet service provider can not obtain the original data content and the encryption key of the user at all. The decentralized block chain is provided with a plurality of block chain nodes, more than half of the block chain nodes are damaged to tamper the promissory certificate or the irreversible verification information, and all the block chain nodes are damaged to delete the substrate of the promissory certificate or the irreversible verification information, so that the promissory certificate or the irreversible verification information can not be theoretically deleted, therefore, the effective and reliable evidence storage effect can be achieved, and a user can conveniently store the promissory certificate or the irreversible verification information for a long time.
The method of the embodiment of the present application is described below by way of example in conjunction with an actual application scenario.
And after the Alice transfers the money to Bob through the WeChat, intercepting a remittance page msg and intending to store evidence.
The Alice user equipment prompts the Alice to input a fingerprint, the user equipment acquires the Alice fingerprint and then carries out preprocessing to obtain a digital code i of the Alice fingerprint identification,
the Alice user equipment generates the random key Ai based on the digital code i of the biological identification and the private key privatekey of the user; and carrying out Hash operation on the digital code i of the biological identifier and the private key of the user to generate the random key Ai. For example: hash (privatekay, i)
And the Alice user equipment encrypts the remittance page msg by using the random secret key Ai to obtain encryption appointment information.
And the Alice user equipment calculates the hash value of the remittance page msg.
The hash value may be calculated based on multiple hash algorithms such as HAS1 and HAS256, and the embodiment of the present application does not specifically limit the content of the contract.
And the Alice user equipment signs the hash value of the remittance page msg by using the private key privatekey of the user to obtain signature data.
And the Alice user equipment uploads a data frame consisting of the encryption appointment information, the hash value of the remittance page msg and the signature data to a block chain according to the sequence.
And the Alice user equipment stores the corresponding relation between the digital code i of the biological identification and the random secret key Ai.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application. Referring to fig. 6, at a hardware level, the electronic device includes a processor, and optionally further includes an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory, such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be connected to each other via an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (peripheral component Interconnect) bus, an EISA (extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 6, but that does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads the corresponding computer program from the nonvolatile memory into the memory and then runs the computer program, and the appointment information processing device is formed on the logic level. The processor is used for executing the program stored in the memory and is specifically used for executing the following operations:
memory, a processor, and a computer program stored on the memory and executable on the processor, the computer program being executed by the processor:
acquiring appointment information msg to be stored, wherein the appointment information msg is generated from application software;
acquiring a biological identifier of a user, preprocessing the biological identifier to obtain a digital code i, wherein the biological identifier is one of a fingerprint, a face and a voice of the user; carrying out Hash operation on the digital code i of the biological identifier and the private key of the user to generate the random key Ai;
encrypting the appointed information msg by using the random key Ai to obtain encrypted appointed information;
calculating a hash value of the appointed information msg;
signing the hash value of the appointed information msg by using a private key privatekey of a user to obtain signature data;
and uploading the hash values of the encryption convention information and the convention information msg to a block chain.
Based on the electronic device shown in fig. 6, it can be known that: according to the scheme of the embodiment of the application, when the appointment information is generated and data is encrypted, the encryption key generated by the biological identification of the user based on the appointment information msg is used every time, so that the data security is provided, and an internet service provider can not obtain the original data content and the encryption key of the user at all. The decentralized block chain is provided with a plurality of block chain nodes, more than half of the block chain nodes are damaged to tamper the promissory certificate or the irreversible verification information, and all the block chain nodes are damaged to delete the substrate of the promissory certificate or the irreversible verification information, so that the promissory certificate or the irreversible verification information can not be theoretically deleted, therefore, the effective and reliable evidence storage effect can be achieved, and a user can conveniently store the promissory certificate or the irreversible verification information for a long time.
The method for processing the contract information disclosed in the embodiment of fig. 1 of the present application may be applied to a processor, or may be implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
It should be understood that the electronic device according to the embodiment of the present application may implement the functions of the aforementioned conventional information processing apparatus in the embodiments shown in fig. 1 to fig. 3, which are not described herein again.
Of course, besides the software implementation, the electronic device of the present application does not exclude other implementations, such as a logic device or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or a logic device.
Furthermore, an embodiment of the present application also provides a computer-readable storage medium storing one or more programs, where the one or more programs include instructions, which when executed by a portable electronic device including a plurality of application programs, can cause the portable electronic device to perform the method of the embodiment shown in fig. 1, and specifically to perform the following method:
acquiring appointment information msg to be stored, wherein the appointment information msg is generated from application software;
acquiring a biological identifier of a user, preprocessing the biological identifier to obtain a digital code i, wherein the biological identifier is one of a fingerprint, a face and a voice of the user; carrying out Hash operation on the digital code i of the biological identifier and the private key of the user to generate the random key Ai;
encrypting the appointed information msg by using the random key Ai to obtain encrypted appointed information;
calculating a hash value of the appointed information msg;
signing the hash value of the appointed information msg by using a private key privatekey of a user to obtain signature data;
and uploading the hash values of the encryption convention information and the convention information msg to a block chain.
It should be understood that the above-mentioned instructions, when executed by a portable electronic device including a plurality of application programs, can enable the apparatus for processing provisioning information described above to implement the functions of the embodiments shown in fig. 1-4, and will not be described herein again.
As will be appreciated by one skilled in the art, embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, the description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The above description is only an example of the present specification, and is not intended to limit the present specification. Various modifications and alterations to this description will become apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present specification should be included in the scope of the claims of the present specification.

Claims (13)

1. A method for processing appointed information based on a block chain comprises the following steps:
acquiring appointment information (msg) to be stored, wherein the appointment information is generated from application software;
generating a random key (Ai) generated based on a biometric identification of a user of the appointment information (msg);
encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
calculating a hash value of the commitment information (msg);
signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data;
uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain.
2. The method of claim 1,
and uploading the signature data to a block chain.
3. The method of claim 2,
said generating a random key (Ai) comprises:
the biometric identification of the user is collected,
pre-processing the biometric identifier and then digitally encoding (i),
-generating said random key (Ai) based on said digital code (i) of the biometric identifier and said private key (privatekey) of the user.
4. The method of claim 3,
and carrying out Hash operation (Hash) on the digital code (i) of the biological identification and the private key (private key) of the user to generate the random key (Ai).
5. The method of claim 3,
the biological identification is one of fingerprint, face and voice of the user.
6. The method of claim 2,
and uploading a data frame consisting of the encryption contract information (msg), the hash value of the contract information (msg) and the signature data to a block chain according to the sequence.
7. The method of claim 3,
and uploading a data frame consisting of the encryption contract information (msg), the hash value of the contract information (msg) and the signature data to a block chain according to the sequence.
8. The method of claim 3,
storing a correspondence between the digital code (i) of the biometric identifier and the random key (Ai).
9. An appointment information processing apparatus based on a block chain, comprising:
the system comprises an information acquisition module, a storage module and a processing module, wherein the information acquisition module is used for acquiring appointment information (msg) to be stored, and the appointment information is generated from application software;
a key generation module for generating a random key (Ai) generated based on a biometric identification of the user of the engagement information (msg);
the encryption module is used for encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
a hash calculation module for calculating a hash value of the appointment information (msg);
the digital signature module is used for signing the hash value of the agreed information (msg) by using a private key (privatekey) of a user to obtain signature data;
an upload module for uploading the hash values of the encryption contract information and the contract information (msg) into a block chain.
10. An appointment information processing system comprising: user equipment, a service platform and a block chain;
the service platform is used for providing application service for the user equipment and sending appointment information (msg);
the user equipment is used for acquiring the appointment information (msg) to be stored; generating a random key (Ai) generated based on a biometric identification of a user of the appointment information (msg); encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information; calculating a hash value of the commitment information (msg); signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data; uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain;
the block chain is used for storing the encryption contract information and the hash value of the contract information (msg).
11. The system of claim 10,
the user device is configured to associate a digital code (i) storing the biometric identifier with the random key (Ai).
12. An electronic device includes: a memory, a processor, and a computer program stored on the memory and executable on the processor, the computer program being executed by the processor to:
acquiring appointment information (msg) to be stored, wherein the appointment information is generated from application software;
generating a random key (Ai) generated based on a biometric identification of a user of the appointment information (msg);
encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
calculating a hash value of the commitment information (msg);
signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data;
uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain.
13. A computer-readable storage medium having a computer program stored thereon, which when executed by a processor, performs the steps of:
acquiring appointment information (msg) to be stored, wherein the appointment information is generated from application software;
generating a random key (Ai) generated based on a biometric identification of a user of the appointment information (msg);
encrypting the appointment information (msg) by using the random key (Ai) to obtain encrypted appointment information;
calculating a hash value of the commitment information (msg);
signing the hash value of the appointed information (msg) by using a private key (privatekey) of a user to obtain signature data;
uploading the hash values of the encryption contract information and the contract information (msg) into a blockchain.
CN201911064199.3A 2019-11-04 2019-11-04 Appointment information processing method, device and system based on block chain and electronic equipment Pending CN111130751A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911064199.3A CN111130751A (en) 2019-11-04 2019-11-04 Appointment information processing method, device and system based on block chain and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911064199.3A CN111130751A (en) 2019-11-04 2019-11-04 Appointment information processing method, device and system based on block chain and electronic equipment

Publications (1)

Publication Number Publication Date
CN111130751A true CN111130751A (en) 2020-05-08

Family

ID=70496094

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911064199.3A Pending CN111130751A (en) 2019-11-04 2019-11-04 Appointment information processing method, device and system based on block chain and electronic equipment

Country Status (1)

Country Link
CN (1) CN111130751A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113901413A (en) * 2021-10-28 2022-01-07 安徽高山科技有限公司 Electronic appointment deposit certificate system based on block chain
WO2022057275A1 (en) * 2020-09-15 2022-03-24 京东科技信息技术有限公司 Data check method and apparatus, and device and computer-readable medium
CN115439118A (en) * 2022-08-02 2022-12-06 上海网商电子商务有限公司 Digital certificate storage management method based on block chain

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108377187A (en) * 2018-03-21 2018-08-07 山东超越数控电子股份有限公司 A kind of block chain private key application method and device based on biological characteristic
CN108629027A (en) * 2018-05-09 2018-10-09 深圳壹账通智能科技有限公司 Customer data base method for reconstructing, device, equipment and medium on block chain
CN108702287A (en) * 2018-04-16 2018-10-23 深圳前海达闼云端智能科技有限公司 Information publication based on block chain and acquisition methods, device and block chain node
US20190074968A1 (en) * 2017-09-06 2019-03-07 Alibaba Group Holding Limited Method, apparatus and system for data encryption and decryption
CN109583219A (en) * 2018-11-30 2019-04-05 国家电网有限公司 A kind of data signature, encryption and preservation method, apparatus and equipment
CN109660327A (en) * 2018-12-19 2019-04-19 上海和数软件有限公司 Block chain encryption method, device and readable storage medium storing program for executing based on iris
CN109660350A (en) * 2018-10-31 2019-04-19 阿里巴巴集团控股有限公司 Data based on block chain deposit card method and device, electronic equipment
CN109740317A (en) * 2018-12-29 2019-05-10 北京奇虎科技有限公司 A kind of digital finger-print based on block chain deposits card method and device
CN109918925A (en) * 2019-02-19 2019-06-21 上海泉坤信息科技有限公司 Date storage method, back end and storage medium
CN109936448A (en) * 2019-02-26 2019-06-25 北京钰安信息科技有限公司 A kind of data transmission method and device
CN110096901A (en) * 2019-05-08 2019-08-06 北京智签科技有限公司 Electronic contract data encryption storage method and signed client end
CN110175441A (en) * 2019-04-12 2019-08-27 平安普惠企业管理有限公司 Data managing method, device, equipment and storage medium based on bio-identification
CN110188526A (en) * 2019-05-31 2019-08-30 阿里巴巴集团控股有限公司 Appointed information processing method, device, system and electronic equipment based on block chain
KR20190118414A (en) * 2018-04-10 2019-10-18 주식회사 넥슨코리아 Method and apparatus for generating cryptographic key using biometric information
CN110392027A (en) * 2018-04-20 2019-10-29 武汉真元生物数据有限公司 Authentication, method for processing business and system based on biological characteristic

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190074968A1 (en) * 2017-09-06 2019-03-07 Alibaba Group Holding Limited Method, apparatus and system for data encryption and decryption
CN108377187A (en) * 2018-03-21 2018-08-07 山东超越数控电子股份有限公司 A kind of block chain private key application method and device based on biological characteristic
KR20190118414A (en) * 2018-04-10 2019-10-18 주식회사 넥슨코리아 Method and apparatus for generating cryptographic key using biometric information
CN108702287A (en) * 2018-04-16 2018-10-23 深圳前海达闼云端智能科技有限公司 Information publication based on block chain and acquisition methods, device and block chain node
CN110392027A (en) * 2018-04-20 2019-10-29 武汉真元生物数据有限公司 Authentication, method for processing business and system based on biological characteristic
CN108629027A (en) * 2018-05-09 2018-10-09 深圳壹账通智能科技有限公司 Customer data base method for reconstructing, device, equipment and medium on block chain
CN109660350A (en) * 2018-10-31 2019-04-19 阿里巴巴集团控股有限公司 Data based on block chain deposit card method and device, electronic equipment
CN109583219A (en) * 2018-11-30 2019-04-05 国家电网有限公司 A kind of data signature, encryption and preservation method, apparatus and equipment
CN109660327A (en) * 2018-12-19 2019-04-19 上海和数软件有限公司 Block chain encryption method, device and readable storage medium storing program for executing based on iris
CN109740317A (en) * 2018-12-29 2019-05-10 北京奇虎科技有限公司 A kind of digital finger-print based on block chain deposits card method and device
CN109918925A (en) * 2019-02-19 2019-06-21 上海泉坤信息科技有限公司 Date storage method, back end and storage medium
CN109936448A (en) * 2019-02-26 2019-06-25 北京钰安信息科技有限公司 A kind of data transmission method and device
CN110175441A (en) * 2019-04-12 2019-08-27 平安普惠企业管理有限公司 Data managing method, device, equipment and storage medium based on bio-identification
CN110096901A (en) * 2019-05-08 2019-08-06 北京智签科技有限公司 Electronic contract data encryption storage method and signed client end
CN110188526A (en) * 2019-05-31 2019-08-30 阿里巴巴集团控股有限公司 Appointed information processing method, device, system and electronic equipment based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
马永仁: "《区块链技术原理及应用》", 中国铁道出版社, pages: 54 - 57 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022057275A1 (en) * 2020-09-15 2022-03-24 京东科技信息技术有限公司 Data check method and apparatus, and device and computer-readable medium
CN113901413A (en) * 2021-10-28 2022-01-07 安徽高山科技有限公司 Electronic appointment deposit certificate system based on block chain
CN113901413B (en) * 2021-10-28 2024-06-11 安徽高山科技有限公司 Electronic contract evidence-storing system based on block chain
CN115439118A (en) * 2022-08-02 2022-12-06 上海网商电子商务有限公司 Digital certificate storage management method based on block chain
CN115439118B (en) * 2022-08-02 2023-11-21 上海网商电子商务有限公司 Digital certificate storage management method based on blockchain

Similar Documents

Publication Publication Date Title
US11907406B2 (en) Computer-implemented method and system of tamper-evident recording of a plurality of service data items
CN110601848B (en) Appointment information processing method, device and system based on block chain and electronic equipment
CN112446785B (en) Cross-chain transaction method, system, device, equipment and storage medium
CN109409122B (en) File storage method, electronic device and storage medium
CN111914027B (en) Block chain transaction keyword searchable encryption method and system
WO2020233373A1 (en) Application configuration file management method and device
JP4819269B2 (en) Ways to protect your data
CN107770159B (en) Vehicle accident data recording method and related device and readable storage medium
CN110958319B (en) Method and device for managing infringement and evidence-based block chain
CN111130751A (en) Appointment information processing method, device and system based on block chain and electronic equipment
Khedr et al. Cryptographic accumulator-based scheme for critical data integrity verification in cloud storage
CN103646375A (en) Method for authenticating primitiveness of picture photographed by intelligent mobile terminal
Matsuda et al. Fuzzy signatures: relaxing requirements and a new construction
TWM589302U (en) Allocation document transmission system
CN110826091B (en) File signature method and device, electronic equipment and readable storage medium
CN113610526A (en) Data trust method and device, electronic equipment and storage medium
CN113452526B (en) Electronic file certification method, verification method and corresponding devices
CN109978543B (en) Contract signing method and device, electronic equipment and storage medium
CN110188526B (en) Method, device and system for processing appointment information based on blockchain and electronic equipment
CN113901520A (en) Data processing method, device, equipment and medium based on block chain
Chernyi et al. Security of electronic digital signature in maritime industry
CN112800477A (en) Data encryption and decryption system and method based on biological characteristic value
JPS637388B2 (en)
TWM582272U (en) Contract signing and verification system based on blockchain
Pinkas et al. Cms advanced electronic signatures (cades)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination